update
This commit is contained in:
parent
865c477066
commit
ad0403554e
@ -103,9 +103,8 @@ def insert_data():
|
|||||||
"language": item.get("language", "")
|
"language": item.get("language", "")
|
||||||
}
|
}
|
||||||
try:
|
try:
|
||||||
# 解析 pubDate 字符串为 datetime 对象
|
|
||||||
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
|
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
|
||||||
# 格式化 pubDate 为所需的格式
|
pub_date += timedelta(hours=8)
|
||||||
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
|
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
|
||||||
except ValueError:
|
except ValueError:
|
||||||
# 如果解析失败,使用原始 pubDate 字符串
|
# 如果解析失败,使用原始 pubDate 字符串
|
||||||
@ -128,7 +127,7 @@ def insert_data():
|
|||||||
entry = {
|
entry = {
|
||||||
"id": index,
|
"id": index,
|
||||||
"title": item.get("name", ""),
|
"title": item.get("name", ""),
|
||||||
"link": item.get("link", ""),
|
"link": f"https://github.com/{item.get('keyword', '')}",
|
||||||
"description": item.get("description", ""),
|
"description": item.get("description", ""),
|
||||||
"pubDate": item.get("updated_at", ""),
|
"pubDate": item.get("updated_at", ""),
|
||||||
"author": item.get("author", ""),
|
"author": item.get("author", ""),
|
||||||
@ -136,9 +135,8 @@ def insert_data():
|
|||||||
"link2": item.get("link_2", "")
|
"link2": item.get("link_2", "")
|
||||||
}
|
}
|
||||||
try:
|
try:
|
||||||
# 解析 pubDate 字符串为 datetime 对象
|
|
||||||
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
|
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
|
||||||
# 格式化 pubDate 为所需的格式
|
pub_date += timedelta(hours=8)
|
||||||
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
|
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
|
||||||
except ValueError:
|
except ValueError:
|
||||||
# 如果解析失败,使用原始 pubDate 字符串
|
# 如果解析失败,使用原始 pubDate 字符串
|
||||||
@ -158,9 +156,8 @@ def insert_data():
|
|||||||
"keyword": item.get("keyword", "")
|
"keyword": item.get("keyword", "")
|
||||||
}
|
}
|
||||||
try:
|
try:
|
||||||
# 解析 pubDate 字符串为 datetime 对象
|
|
||||||
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
|
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
|
||||||
# 格式化 pubDate 为所需的格式
|
pub_date += timedelta(hours=8)
|
||||||
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
|
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
|
||||||
except ValueError:
|
except ValueError:
|
||||||
# 如果解析失败,使用原始 pubDate 字符串
|
# 如果解析失败,使用原始 pubDate 字符串
|
||||||
@ -185,9 +182,8 @@ def insert_data():
|
|||||||
"language": item.get("language", "")
|
"language": item.get("language", "")
|
||||||
}
|
}
|
||||||
try:
|
try:
|
||||||
# 解析 pubDate 字符串为 datetime 对象
|
|
||||||
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
|
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
|
||||||
# 格式化 pubDate 为所需的格式
|
pub_date += timedelta(hours=8)
|
||||||
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
|
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
|
||||||
except ValueError:
|
except ValueError:
|
||||||
# 如果解析失败,使用原始 pubDate 字符串
|
# 如果解析失败,使用原始 pubDate 字符串
|
||||||
@ -316,7 +312,7 @@ def get_filtered_articles(entries, Is_short, choice):
|
|||||||
result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
||||||
result += f"更新描述:{entry[3]}\n"
|
result += f"更新描述:{entry[3]}\n"
|
||||||
result += f"更新时间:{entry[4]}\n"
|
result += f"更新时间:{entry[4]}\n"
|
||||||
result += f"提交者:{entry[5]},[点此查看提交详情]({entry[2]})\n"
|
result += f"提交者:{entry[5]},[点此查看提交详情]({entry[6]})\n"
|
||||||
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
||||||
elif choice == 3:
|
elif choice == 3:
|
||||||
result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
||||||
@ -337,7 +333,7 @@ def get_filtered_articles(entries, Is_short, choice):
|
|||||||
result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
||||||
result += f"更新描述:{entry[3]}\n"
|
result += f"更新描述:{entry[3]}\n"
|
||||||
result += f"更新时间:{entry[4]}\n"
|
result += f"更新时间:{entry[4]}\n"
|
||||||
result += f"提交者:{entry[5]},[点此查看提交详情]({entry[2]})\n"
|
result += f"提交者:{entry[5]},[点此查看提交详情]({entry[6]})\n"
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
elif choice == 3:
|
elif choice == 3:
|
||||||
result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
||||||
@ -359,7 +355,7 @@ def get_filtered_articles(entries, Is_short, choice):
|
|||||||
record += f"#### 项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
record += f"#### 项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
||||||
record += f"**更新描述**:{entry[3]}\n"
|
record += f"**更新描述**:{entry[3]}\n"
|
||||||
record += f"**更新时间**:{entry[4]}\n"
|
record += f"**更新时间**:{entry[4]}\n"
|
||||||
record += f"**提交者**:{entry[5]},[点此查看提交详情]({entry[2]})\n"
|
record += f"**提交者**:{entry[5]},[点此查看提交详情]({entry[6]})\n"
|
||||||
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
||||||
elif choice == 3:
|
elif choice == 3:
|
||||||
record += f"#### 大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
record += f"#### 大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
||||||
|
@ -38,3 +38,4 @@
|
|||||||
- 2025年01月02日晚:再次优化了文件结构,提高可读性 <br>
|
- 2025年01月02日晚:再次优化了文件结构,提高可读性 <br>
|
||||||
- 2025年01月05日晚:修复了doonsec相关配置的bug,程序现已可正常运行 <br>
|
- 2025年01月05日晚:修复了doonsec相关配置的bug,程序现已可正常运行 <br>
|
||||||
- 2025年01月06日:更新了配置信息自动获取的逻辑,添加关键词等现可在运行时添加,重要配置信息(config.yaml)仍需暂停重新运行 <br>
|
- 2025年01月06日:更新了配置信息自动获取的逻辑,添加关键词等现可在运行时添加,重要配置信息(config.yaml)仍需暂停重新运行 <br>
|
||||||
|
- 2025年01月10日:修复了github推送的问题(时区,消息配置错误等) <br>
|
19
baidu开发文档.md
Normal file
19
baidu开发文档.md
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
### 设计思路
|
||||||
|
前情提要:百度搜索的爬取处理逻辑和搜狗-微信公众号的逻辑基本一致,但是百度搜索杂系数太大,存在大量不相关内容,所以使用百度的一个参数进行调整。
|
||||||
|
api地址:
|
||||||
|
www.baidu.com/s?wd={关键词}&cl=3&pn=1&ie=utf-8&rn=20&tn=baidurt
|
||||||
|
- wd={关键词}:设置查询关键词
|
||||||
|
- cl=3:查询类型,3为网页,2为图片,默认为3
|
||||||
|
- pn=1:指定查询页数
|
||||||
|
- rn=20:每页显示数量
|
||||||
|
- ie=utf-8:指定查询编码格式
|
||||||
|
- tn=baidurt:设置为简化格式,爬虫友好化
|
||||||
|
|
||||||
|
### 速率限制
|
||||||
|
建议设置高每页数量,减小搜索次数以规避反爬虫措施。
|
||||||
|
|
||||||
|
### 使用技术
|
||||||
|
- python-bs4网页解析
|
||||||
|
- python-sqlite联动
|
||||||
|
- python-request爬虫
|
||||||
|
- sqlite筛选
|
Binary file not shown.
@ -24,10 +24,10 @@ sender: test@masonliu.com
|
|||||||
receivers: ['2857911564@qq.com']
|
receivers: ['2857911564@qq.com']
|
||||||
# 结算时间范围
|
# 结算时间范围
|
||||||
e_hour: 4 # 程序运行时间间隔
|
e_hour: 4 # 程序运行时间间隔
|
||||||
time_mode: 0
|
time_mode: 1
|
||||||
# 0:定时运行模式,仅在指定时间运行(参照Core.py中设置)
|
# 0:定时运行模式,仅在指定时间运行(参照Core.py中设置)
|
||||||
# 1:启用循环,一定间隔时间后运行
|
# 1:启用循环,一定间隔时间后运行
|
||||||
mode: [0] # 运行模式,可多选
|
mode: [1, 2] # 运行模式,可多选
|
||||||
# 0:启用RSS抓取模式
|
# 0:启用RSS抓取模式
|
||||||
# 1:启用搜狗-微信公众号文章监测
|
# 1:启用搜狗-微信公众号文章监测
|
||||||
# 2:启用github项目监测
|
# 2:启用github项目监测
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -110,10 +110,10 @@
|
|||||||
{
|
{
|
||||||
"link": "https://api.github.com/wy876/POC",
|
"link": "https://api.github.com/wy876/POC",
|
||||||
"name": "wy876/POC",
|
"name": "wy876/POC",
|
||||||
"updated_at": "2025-01-04T06:15:34Z",
|
"updated_at": "2025-01-07T07:14:02Z",
|
||||||
"description": "README.md",
|
"description": "Update README.md",
|
||||||
"author": "wy876",
|
"author": "wy876",
|
||||||
"link_2": "https://github.com/wy876/POC/commit/d6a2a1e8cfb5db7059511fe5b02745327bd25efe",
|
"link_2": "https://github.com/wy876/POC/commit/9eefec0a4c311a412a86ab83bef3a25d3cb1766d",
|
||||||
"keyword": "wy876/POC"
|
"keyword": "wy876/POC"
|
||||||
}
|
}
|
||||||
]
|
]
|
@ -2,142 +2,142 @@
|
|||||||
"银行测试": [
|
"银行测试": [
|
||||||
{
|
{
|
||||||
"title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元",
|
"title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd96gjASBlwUFSqWrJq9alN4-cD8UKdfyYRmq92d8CN3CH0g3HWxZYWpx91CwKZQf3SmD133jeXS9hC2mzDL34Zuo8bNtdNkcws4MRmO4xmHoeLVGZTzAewMfnjvxIWNdB9yWSvDNh2HojXkNjQdMv7Kq6x9bZVTQhwdEyfatc_3ZajotuuiAmOIg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9uBmqTfM-y4nsoj9xXyjEwFFJocsdI0HMyqzPegXqvHaxeLZkj3zzLA99fw1CidOsG_nLFmHVbh_Bh33KpirDDG_zNb9SpnU8Y0IFy0clsXCxa_sS1YLULmpKDyygnGxOTsJdIvAJj49Eh-WgjUguHdTpKGiCkjLMikGk8ZmcOHfzAjcIGepUqA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...",
|
"description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...",
|
||||||
"author": "观八闽",
|
"author": "观八闽",
|
||||||
"pubDate": "2022-02-22 15:30:56"
|
"pubDate": "2022-02-22 15:30:56"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "央行出手!支付宝们正式被“收编”了!",
|
"title": "央行出手!支付宝们正式被“收编”了!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX4mNlNXRqlmWhnN00FW01mQJ6Cq1_wcjAYgOP1R5cvAKAT1IsxuN43PU0aaIM5G9I4iMeicHsZmaWvJTr0FR9KydodjkDBa9gC1HBpiJyORkZiyUIOrzjX2q3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_lk2yA87GAVvPeFd4Kyy9Vc3Rk_ZC3DSg1oIY7qM84PHcvJd27OBShi4sczy_Y_vZH2KhHIxXtjm2_ZbKXKuHsXABUPgshdZk1m7cHkwXbUSTWz0F8cq6L5z0OK9DLfgmPA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "根据央行要求,目前,已有20余家支付机构和银行完成了接入网联平台的工作.央行副行长范一飞此前曾强调,网联平台的目的即提高...",
|
"description": "根据央行要求,目前,已有20余家支付机构和银行完成了接入网联平台的工作.央行副行长范一飞此前曾强调,网联平台的目的即提高...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2017-10-17 11:43:30"
|
"pubDate": "2017-10-17 11:43:30"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "美联储最新消息!要求银行多备“家底”,特别是→",
|
"title": "美联储最新消息!要求银行多备“家底”,特别是→",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9BPIo8QLoEC_lu8ScaJKxGD9-S8LsNyq7vhHn8WWk2filE7c5ZGkw1anPy5RoRMOOlXXEFpWD2-z4uzbjvbThRtFLBq6sqoGAJvvqQJrhGRvkyoIUFinrOSHMqyTBAhaAFtP89LGcHXY_lnpd9I5uHN1NMiWi3-nXU3s-y5L509bm0CtGSSkZQQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9x0RJb1uNorPgftTZLUPMYVlZDZOF-ItpngMjL5_OQhtyJAC1niFDEy19L6dBvnOY17CB2hTU9gbvwd9d-c6NSB6ecbdNsQ4-SKziE28OvzLtlyxnUA15QBa8Bl8lvm7LIKac71VBnLKsaFxgZJmQbSlcrASRqo7h7etHpSk9GPFj3x9Nw6p-Fg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "扩大美联储年度银行压力测试范围等. 美国银行业游说团体:更高的资本要求将推升借贷成本今年3月以来,美国硅谷银行、签名银行...",
|
"description": "扩大美联储年度银行压力测试范围等. 美国银行业游说团体:更高的资本要求将推升借贷成本今年3月以来,美国硅谷银行、签名银行...",
|
||||||
"author": "央视财经",
|
"author": "央视财经",
|
||||||
"pubDate": "2023-07-12 16:15:05"
|
"pubDate": "2023-07-12 16:15:05"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "平安银行、宁波银行等试水支付宝信用卡取现功能,缘何引发舆论争议?",
|
"title": "平安银行、宁波银行等试水支付宝信用卡取现功能,缘何引发舆论争议?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9RzvTwRtWYY46SVdzi5AK7vdYtVIWxOxZDKCkSE_i9yyqMMZ20cZ1tet8xLzKyroEO77zXjakm4E3k7tbo1snKjWXKtdWcFdt26OsIF4Ogndp24w1YN_8XQJSaYhp-sotUP3nDUA-XmPK_uM8XOFLwFtxtKAK1D2MJV1GTpNItLf1AfaFW2DefQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd96AEaSzpLm-rNz9gvH9Mw7juO1CMUmhSqFXgLknzeHBUXPQ5j0cr-_eDz1HsLfvG2Ywukz9KFbK-8yqQvky8vbhGCeGEdSdiwvr_r90No_z720O0TXaFGS_CMpgiX1HtdqotEhit6QfoVqXyr1F2vbA16lkvjcK0V1ACCIW9Z-MhQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "话题#微信支付宝测试信用卡取现#与#有银行试水信用卡取现:年利率超18%#分别登上微博、头条热搜榜.(来源:人民众云)(来源...",
|
"description": "话题#微信支付宝测试信用卡取现#与#有银行试水信用卡取现:年利率超18%#分别登上微博、头条热搜榜.(来源:人民众云)(来源...",
|
||||||
"author": "人民网舆情数据中心",
|
"author": "人民网舆情数据中心",
|
||||||
"pubDate": "2022-08-31 19:55:10"
|
"pubDate": "2022-08-31 19:55:10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
|
"title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX1kv60Nl9NUocyG5omBgAzqyhSXI3oGv5MBVM7XsbV8--xNXP0IDjc51i4F8EWCyrCbsgIKyI2dqFslqoXQHyBbuzxSAZWAGtDRe_KXOlvVhQtlGooQ6xYr6zvkPgoArRQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_lgVQ3PpOdEZvxYy9NN48rT0H7oCiHAjlFkf-gqSl_9O6fE7BXPbWMzx57zv5FbumE6140xqOoX4Z0MyVPXVMDfdF0FVRYe6GmX7v6dNojYT342kEU62ok2NCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
|
"description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2017-05-29 08:02:43"
|
"pubDate": "2017-05-29 08:02:43"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?",
|
"title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ItfcIcKoWlLm8Rr_34Fda7N0QENXqvUdpC8uDCUMyP3o8kt-vjbwvo2jDC738B-2xWbdEKfY1O6EZpU8fDyyy7-FVN_6GvWw2wVnWCV_xKj180rrEYdldMUAvPcTu1jIlcL4-eY0sAdHck81TMJpkYwOOxFnW03FOTV2DXA7Hpte0WC6Sbi7DA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd95gufFuvmFmunuzImDXDgKxIsYyBuv1iylpinM2yJqtal_DwtO966KSvBk1At-veQH3AHVYHsafRaFsWrARuyctj_i9s8VDpeSaeetiSdqofYf4gBRIyEaMg_0k_9xJL_QyrethG4RTaeQ1TbaM3rq4B8-P1hvntGE1gcvUf34arm0CtGSSkZQQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...",
|
"description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...",
|
||||||
"author": "新华网思客",
|
"author": "新华网思客",
|
||||||
"pubDate": "2023-05-05 13:51:35"
|
"pubDate": "2023-05-05 13:51:35"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?",
|
"title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9RzvTwRtWYY46SVdzi5AK7vdYtVIWxOxZDKCkSE_i9yyqMMZ20cZ1ten6BVrWcbLSaeG0DGxoah32zYL2R28r8t_uFYTgU5UCXDV-fA0eAtaVLxBnrPQwq9dyFJC5MTAQPUh92kuYx0dz_OkgxIVMN4NNG14Jxnxyi0p0l5-cLjSE8RsmObDbtQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd96AEaSzpLm-rNz9gvH9Mw7juO1CMUmhSqFXgLknzeHBUXPQ5j0cr-_c2txhR-1LXVPPx8y0ZBuoE7QzgFPAD5RBkfIoNQhoI0q9it_G6I08gjunphJjtvHsrpS-YG3YD-qJiidS19dgNHwu9Rlke_k90hxgVztir6yBPEnKgzXaECYioxHkzTmA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...",
|
"description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...",
|
||||||
"author": "人民网舆情数据中心",
|
"author": "人民网舆情数据中心",
|
||||||
"pubDate": "2017-09-14 08:16:46"
|
"pubDate": "2017-09-14 08:16:46"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10",
|
"title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsVOz8NzTUl--VgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3SJgbbWFN17kjfqrSL_2PJVIhAsjXs3f_DlIopi7j_Sok8JIrH16vSVXuSIe89MhwiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWINRLn_OoTJmmVgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI37CQEHgmP4AxQAEunkkd7sE4haTNX9yxvEwV32aUJfTCul0Art-alMu75l5qp49P5iZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...",
|
"description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...",
|
||||||
"author": "人民网舆情数据中心",
|
"author": "人民网舆情数据中心",
|
||||||
"pubDate": "2017-01-12 17:06:08"
|
"pubDate": "2017-01-12 17:06:08"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "警惕 犯罪分子用美容卡到ATM机就能提走你银行卡里的钱 还有这事?",
|
"title": "警惕 犯罪分子用美容卡到ATM机就能提走你银行卡里的钱 还有这事?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsVOz8NzTUl--VgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmMnQlnLeioc3teHPGFtZgtcE_sh7rSSEZnor6LNsNpWEvD3_mwMlEdhex-WGqPYDE1iZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWINRLn_OoTJmmVgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmM8_xzsJhyuhwsx93e6R5dMXIeLqMttJuPATjtvUTLlEdt98MdG4C0pQJeWmLLAvpeiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "近日,广西玉林警方破获了一起银行卡系列诈骗案,打掉了一个专门伪造银行卡的犯罪团伙.直到案件破获时,很多受害者还不知道自...",
|
"description": "近日,广西玉林警方破获了一起银行卡系列诈骗案,打掉了一个专门伪造银行卡的犯罪团伙.直到案件破获时,很多受害者还不知道自...",
|
||||||
"author": "央视新闻",
|
"author": "央视新闻",
|
||||||
"pubDate": "2017-01-14 16:40:10"
|
"pubDate": "2017-01-14 16:40:10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?",
|
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ItfcIcKoWlLm8Rr_34Fda7N0QENXqvUdpC8uDCUMyP3o8kt-vjbwvoTmS2wQM2YPMe_Od8CN0h0ZTRrI1bsRi36o3NVnPdCQTe1qvLMqw08cOLg_T2JYwTORyotNYWVo_hvRaFd77uhDl-6mCphnALHU6q1SG-UuWYSWBra5Nsg6Ebq8fk9diw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd95gufFuvmFmunuzImDXDgKxIsYyBuv1iylpinM2yJqtal_DwtO966KS6mwZuB7PscQPhGgEvPCjHcSNYYM3p8CESO9VhvuenI8iEnO9ogE32uPr11cAoqla88cFVDdmyjqt2HFN3UyKHAM5rhbBmAd8eu_k6x-3yzU7poz-7MFGSFW6cwuUnkdA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4",
|
||||||
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...",
|
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...",
|
||||||
"author": "新华网思客",
|
"author": "新华网思客",
|
||||||
"pubDate": "2023-03-16 10:44:22"
|
"pubDate": "2023-03-16 10:44:22"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"APP逆向": [
|
"APP逆向": [
|
||||||
|
{
|
||||||
|
"title": "Python爬虫开发从入门到精通APP逆向班 十一期 语文五哥 写作素养 家长必修课share",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9ULdrNr8Lc1z9HvYjwTeL3gn_T3IIbIxgbouUygTTQzs4BHEj8pPg03_3QlqNu1h_brNoNz0uwl8kw2CoRSc3V7rah1FP3GjLjaPcLcDHESE9fOOeX2sMbZFeltslBrlswC29NObfbjt3yK3k3UilXsLrAO71pqWmmYOiqhDNtuUCYioxHkzTmA..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
|
"description": "有Python爬虫开发从入门到精通APP逆向班 十一期 这个课小编唯(^_-):yyywk5 或 yyykc1---------以下是填充----------有Python爬虫开...",
|
||||||
|
"author": "好学知识园",
|
||||||
|
"pubDate": "2025-01-02 17:23:55"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"title": "路飞爬虫开发App逆向第八期share",
|
"title": "路飞爬虫开发App逆向第八期share",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9l40l5MWzjtbsbsR6eNCWCFc2fBtcWxYi1RScM2JNWvWAbXS2wSQe0vsRQxnJ7FxpS7-Hly9zOKbAYIy9riVzrmGRJgS4PuGQmbXjaxbg2fDzhk0fzVTRilh1Dg5i4BYm9iLOcV7xnhleHYIRY1mnBfK97YnmvOAU-mai6i3jnIE6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd95oD-toi_5trgSuc9Nels9Ufpilh9FkI9tZOzR5vZ-va5Yd-z66UPgzEwgrxuVxxuHLCD3ujfEjmAA1u2tIYRajsgXqZmofFO2E17uRZxAPevVjLJWD_INMZfh5LcaGPd0BPzZkSkoq2kdN2l4fRiq0FyBPK7jd9TOXdgrCjYo3gCn9lOoZLP2Q..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
"description": "关注以上公众号,后台回复 课程 即可领取哦~有路飞爬虫开发App逆向第八期share路飞爬虫开发App逆向第八期share### 路飞爬虫开...",
|
"description": "关注以上公众号,后台回复 课程 即可领取哦~有路飞爬虫开发App逆向第八期share路飞爬虫开发App逆向第八期share### 路飞爬虫开...",
|
||||||
"author": "小马找课呀",
|
"author": "小马找课呀",
|
||||||
"pubDate": "2025-01-01 05:11:41"
|
"pubDate": "2025-01-01 05:11:41"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"title": "一文了解安卓APP逆向分析与保护机制",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9OA-y9C60IE-npO37WN82TlW0SZ-ySzWn45G6zLFp6I1yj4loMO3bfj3humpwptDRbEJyjNDsbawLqlyDY2crnuCOeWpl1fqHvMk7rssIzzTHnmoiXrmqTp4VL2r66onxNjLT3YKAkrhiStrVU8t3sgukCyJGd2TBXVadmu6l5TOE8RsmObDbtQ..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
|
||||||
"description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...",
|
|
||||||
"author": "FreeBuf",
|
|
||||||
"pubDate": "2018-03-31 18:12:34"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"title": "AndroidApp常见逆向工具和使用技巧",
|
"title": "AndroidApp常见逆向工具和使用技巧",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsSr0UegHo_8eVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AEZKkSu6ctdDFCQQgOOwZapcVyAZ3I_PY9VtKigBfXGyg4kpWQffwFHw4vjE6ADUXiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIrEafOQmfu4uVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AFBTCYE2dpEWhBBUnn1bF2GMpP8Hz7LzzGiz1bAU7yrDxZZI9lCe25afpvcDWXPS6iZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
"description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...",
|
"description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...",
|
||||||
"author": "黑白之道",
|
"author": "黑白之道",
|
||||||
"pubDate": "2016-10-26 10:17:15"
|
"pubDate": "2016-10-26 10:17:15"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"title": "一文了解安卓APP逆向分析与保护机制",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9LsR8mCWefbx3cRV0BDuy9-sdS8Et4AYhxzRiOWF_GvxKIWXmCO8iqTc1lE-DUs3abKpdEMyO1qkxmiO5iiQySuf1P6QfCAIB9pIoLm_zlPFiyrfnXnGj4WGxSLPtlacTeeKkREAyrbTA3p1Z72FCvjSVQ64MievCbmN4zhckSicC2Qmj7RgGwQ..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
|
"description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...",
|
||||||
|
"author": "FreeBuf",
|
||||||
|
"pubDate": "2018-03-31 18:12:34"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"title": "FlutterAPP逆向实践",
|
"title": "FlutterAPP逆向实践",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9XaFRr9-KEoQ7epe88ZjBhpKdFNuZ0flx7uWdPvFHT6FLj96Ft5D40pAhJXVi62Fu1OBlqLeQHR6pl7E3Onhe8_KSuYpfoz-nMx6NQN5gvmlwBN2BLnvKNFfgGoVFfvji05X42WeTRJbLWq-d9wNbSveee96zYAzf4ZcQ3sDhmpbdrgozfSg6bw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9qjpA3veeY-KdBJSH508h2ao6GqlcXBkGAI3gNcG9TKSac92MpYRXFwzgf7IxhrbVjLzyYdH-ipMMpqbRANg3RGk6q6RSvFwEotgrdzV1GH2euvubPwgFuFOKSNh0unJQ1P608zgLZkATrTbSmyxa3qP9Fsc-zSV7s5e4tuFMxNBhlgeRt7bSzA..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
"description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...",
|
"description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...",
|
||||||
"author": "看雪学苑",
|
"author": "看雪学苑",
|
||||||
"pubDate": "2022-07-21 17:59:03"
|
"pubDate": "2022-07-21 17:59:03"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"title": "记某APP登录逆向解密过程",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9TDjn6xUhYtyquFIJ5GlKHgQw2hsa88qvWlDV8Iwt8p_1UD-MDApVoiuFUWTugAQaBoi2SXoGtadFvS2kDJs9ob5vtkRuYVNYI9YT2F7AGQXgy_6NxCsKH0LUV9UmJm042kTBFuUlvaJ8Z879KInFPbPRuc4RqTmbdsc1TMvIXonuL0unUdKkuw..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
|
"description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...",
|
||||||
|
"author": "黑白之道",
|
||||||
|
"pubDate": "2024-05-03 08:36:47"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"title": "APP逆向神器之Frida【Android初级篇】",
|
"title": "APP逆向神器之Frida【Android初级篇】",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9_j6j2UQN-vxChK1eOjr0eV4x0Gr7qGfxyJYT1IO9o92OYF_6hIhsjJKE2v5sJLkZQ9POZalNGJgbHBCqMNLOw2ax_tV8iR35g8jJjvvwlC3av3PGngcOQN8XSGpD-AWTkLIzjJ7_lWPAOTdf6aFmfPo5_F-iNt59bA7SDsc8rvcYJSSFPgfogQ..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9MONZWwY2e31Kgj_DEYF3LmznY349dkgnWNMy6EVefBS-zfnhPSV0xRDW6bORJGsH-LxRMwspMJUA8M1V6okWS9rOULS5x2vLMc_rtx9obGs1TtJaggaAp531macUe6gHI4vgVBzc4pJTDGxuVxQMyGL5p-35mzmbkCVfs2z6rRkHpHkoPMgL3A..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
"description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...",
|
"description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...",
|
||||||
"author": "NightTeam",
|
"author": "NightTeam",
|
||||||
"pubDate": "2019-07-03 09:00:11"
|
"pubDate": "2019-07-03 09:00:11"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "APP逆向sign签名算法:Python实战指南",
|
"title": "APP逆向sign签名算法:Python实战指南",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9Z2uQi14zjGFECgple0Il5-1K8SLax84YfVaqkNMacaLrG1rkvGbndY6sEGVytRQ2Xa9okGtxlAiFdqvEtLdW8rbW9xGCpXc-0hrzlDs5UvWb91zgNMTb1rkzPqK4FbfdwKi3bykgC3WcITmV9kKf9MJmAnpcRK7rN62zqqL31VVS6t2rFt2rnA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9jlaxwnjFyK8TgmUewblozGTo0OtWYsiUKVnnYWvLbIaM6xqgnFZas1yqfSvD7qiGXGaUR2EEFQE6Hvzt1-CTfY4oc7mVr2K_GnHt14lk23aePCYX4pIVwjDVfufhGn5nMKEDU_cLiT_2rFBE8yflu6CXvwpBp3wzboZJK_gy8fZ5Nu7CnoSqqg..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
"description": "在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...",
|
"description": "在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...",
|
||||||
"author": "雷雷讲py",
|
"author": "雷雷讲py",
|
||||||
"pubDate": "2025-01-03 09:40:29"
|
"pubDate": "2025-01-03 09:40:29"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "某文APP逆向抓取分析",
|
"title": "APP逆向系列学习(二)",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9Qik4Bv1BdhGxuGMxUzDpjTHOHAh2qfSAh3Krx_VuApSoTdBPktWaIA3Epnk8GTJMeXFCVhhtbySJLh6_XpknCTNSZNDBWubXlcGZvix282X7mCdrMEP3WRC6Pd_oeSUHGhU87R4ma3wJvots1NbSZ5qCC1EK-lgfPTVgeIFcOgPYl_Q5RRZQjg..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd92qncWfEbAvtzGcKRzBFPQozLI431gF48Z2U-FsKwQJfFyw9RXdaqWMLuc0Z_V7udSQvOGBgLeCDq04U-bF25vlUzA9mPefOljzWzWppaDmh8Nq3eEfLul5gryq7ZDNBJECSEG2T6U03lguNPgEkgGtD3NsBdVri0rG5zJ7mvUlb6zvkPgoArRQ..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
"description": "逆向app一定要多练习,这样才能在实践中找到自己的不懂之处,才能够成长.好啦,今天的逆向小文章就到此结束啦,童鞋们下篇文...",
|
"description": "APP逆向系列学习(二)这个章节主要是体验frida进行脱壳,前期有些问题太多了,真是人麻了.android配置:说下遇到的问题,在...",
|
||||||
"author": "猿人学Python",
|
"author": "呼啦啦安全",
|
||||||
"pubDate": "2020-05-07 20:19:43"
|
"pubDate": "2024-04-18 13:47:14"
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "抖音APP逆向:附带抓包与6神算法探索",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKNciYPpIcdmE5dl9P8Paw_x58MkIGEcJw3juWkEMf3Hfa2tGfX7oJGkopviLeKN6p0Qsf5Pjq5lQJ440gcqIG3P92dCjJKmIEw71YhhkAfJptZjnqDZ-9WctPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
|
||||||
"description": "走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必...",
|
|
||||||
"author": "彪哥in讲py",
|
|
||||||
"pubDate": "2025-01-03 13:10:22"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "APP逆向工具清单",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKEQotIC1WeYHE8IYVGBIMwjYX9eBY-oL5HUkRlYI-PnA1yRFHhpHP7Sm7W-AWObVBA3hV_7JOu-4Bl_kDMDYSBKlyTq-ojDhmiIxLICWVTQxzYYD-Z4gXxIGX_iHL9MadA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
|
||||||
"description": "嘿,各位热爱编程的小伙伴们,今天咱们来聊聊APP逆向的那些事儿.给大家整理一份实用的APP逆向工具清单.一、环境准备篇重点...",
|
|
||||||
"author": "彪哥in讲py",
|
|
||||||
"pubDate": "2025-01-03 13:10:22"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "对某数藏类app逆向安全分析",
|
"title": "对某数藏类app逆向安全分析",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9GiViCKgEh3hp7ZlMSpKeIxQIvdCmAeOoiCEAYw2fNdPDoAUxw7Sq0DjCePM34mg90eQZy34NnNqcQj5B9QyHOBprivnuY9SDKs905S9kj1Tnh4hFQDNN_v8e06kIiEF_i9uWMfyA3VvPejxQjlknYq3DhADG6xVBsJgDwHp2pAz2CsG6-xMgzQ..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9M9zjE8MJhOEZlPmWi2rm3KbJOj4k4ZGisjpqaLZow-9EtQUtJAQzDzU20xoJes1SraT0lYB-kKnHoReqfTbZ3XNyu4hr1xfhZPZSI31v6a4qNr-s0ukZGeMUCsQmLSroj1mwEAyv--q9g2xhNzxY16ZxTwcuOpTpiWTn5J75Lxxf_71bqkOtiw..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA",
|
||||||
"description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...",
|
"description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...",
|
||||||
"author": "编角料",
|
"author": "编角料",
|
||||||
"pubDate": "2023-03-10 18:32:22"
|
"pubDate": "2023-03-10 18:32:22"
|
||||||
@ -146,70 +146,70 @@
|
|||||||
"渗透测试": [
|
"渗透测试": [
|
||||||
{
|
{
|
||||||
"title": "200万年薪!人民网这个岗位等你来!",
|
"title": "200万年薪!人民网这个岗位等你来!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX8qGwPH3KbbcOfd5INLRfVOxfp1RmFDjWiC5AESW6uBQt1ARzykp6WnXPJqVHomGyuI1e2brDBsJsJAkCE6fFpUM_dvx1Fbs1R1ahyanbhhtQnaAWuchNYhOJBjQH7pCxQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_ljlno77iIOd5lcl9F5wsb3Iilf2w089eSCo9KsfpFOwwGqQl_bK-oUDVZc-3WXl5GbcBkEAxO2zSXGrjDvFNuRnXE0XZk4URT_9itp0iK8B6Kk8NxgJ1JKt5Nu7CnoSqqg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...",
|
"description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2018-08-03 15:22:17"
|
"pubDate": "2018-08-03 15:22:17"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "人社部拟新增10个新职业,看看自己能干点啥",
|
"title": "人社部拟新增10个新职业,看看自己能干点啥",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9dZOej61YtrTs2h1vajWyLvKQP6bKmphmX2eNGeMCIj9cimnvgL6vCF4lh-VxQl2-B2l1KbtoyjAjcti6Ew5yPemwVke2fiYQ1b2--6hUi0rnBgUnzvAraGWPflbRRq_Cer5174dgOFyK__WHtse0Kf33KGmbqhX4RMGQt_DwgyBAe0f8bRARvQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9efcbaMmiv2GsVuzzmtuIvcbwVbQy5CMYK9EhVSPcXal8GHjOeUZLTJTuQ8dbekr_tW3ZXE-qnvlV5rIPB3AE_GZM1ER0OEB1ABQZp2pJpVsze_Gm84vP5fHdrJOJFabXOh1qi2Y_a9GAz5YdH7cNltW-Y6aOZefDoc2WM7_UIKGfxjh3za6jWA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...",
|
"description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...",
|
||||||
"author": "人民网海南频道",
|
"author": "人民网海南频道",
|
||||||
"pubDate": "2020-05-13 14:27:12"
|
"pubDate": "2020-05-13 14:27:12"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
|
"title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9PqQlcuvFN9g_bqeJ5QbmnFYukolAkRoQx0xYBeMcYYfmYhi8e3rtj7iNCfeiK5HlQDI2bw8Osk9rxaMLLJwXsQphT_kRDliL7scQtccwCZHS-mTRty1p96RW6EiR-yQysa0_N306GbPD4ev3QkpZXZ2tgMs5FpOKxlWWwy28zbM6Ebq8fk9diw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd93OSGFv8EmwpbmU6uHCYRYcvX3pfHaXZWlcOOZa5X0lCTXjKdJveeVO0g5kMAKOpF8o8Fd_QSPgErO-zdfciZKKPXBZ3mjrEfBZLnVImKzUad3Uqo9ItxnBrr8TDSwxt9qrIlIYRzVJ91IchRHgT8pK6S0X5kz0PcjF85E3-plshAe0f8bRARvQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
|
"description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
|
||||||
"author": "新华网",
|
"author": "新华网",
|
||||||
"pubDate": "2017-08-24 14:13:15"
|
"pubDate": "2017-08-24 14:13:15"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "中新网招新了!打工人,速来!",
|
"title": "中新网招新了!打工人,速来!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9wS1-G8W9o-dL0JnQBeYzqIiA8EPSwmklDhtUOAJ_gaxnBlMl-tw95bALxp9cqLooLYczvhrvkAT24s-4JDW_cGN6DcrYgusOEMtZ7fwAigRz1xdN1W7kAnUlIVB0i6u2MT3T0lmG-EXTxO655c74o6kCwZJL8l1weOMKobcj_NQSYTqT4eyLmA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9brqA-2z5sV44YpCsy2p-lvlTHlDECaDYlWimKytQYjBS-roqmgf69-zUQXfJqJ4bdXzfn7Wo3LAU8kteQdFHZaDOowCBoxAnbwG4i7jFUq5fqwBpwKfw6LhLOrRCPyycWLYiC1Y8GocHkRxe7eS-9cLzBeO_khHWn8GSvOWsdJ2fxjh3za6jWA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...",
|
"description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...",
|
||||||
"author": "中国新闻网",
|
"author": "中国新闻网",
|
||||||
"pubDate": "2020-11-03 15:52:39"
|
"pubDate": "2020-11-03 15:52:39"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "人社部拟新增10个新职业,网友疯狂@李佳琦",
|
"title": "人社部拟新增10个新职业,网友疯狂@李佳琦",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9TZnKhlrYzz2C1Nz4XB2uPAU7INirf6N-EPFi35x_DyDQQ2U_N0i2TTSVXCM-RaBIngebSx1NYTMxIp8fIEf4GllEl1P12oBM0SDJmQOtTYix88S5OWkRiuo1Uqih0dC41ndhrPQ6j07RVVxMWkSNvVEw-HEGSL7N7xWZGQs8WB5535pjGOOjYg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9iap-xwd8B2DOWjyowLFx7eyUlNAtStx_hC0VIFtlV6zfQAZaW-UrNEODhAQ2cc_dXUULGvGpybH85xwrDgLgeX8EQfnASsL1DO0FcbJvp1OmDFy70CzZNgl8Aakf0FRSamMqDafxAbPltDzVwa6ppK8D3eH3rOTeEYuK8Y51BXEGX_iHL9MadA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
|
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
|
||||||
"author": "光明网",
|
"author": "光明网",
|
||||||
"pubDate": "2020-05-12 18:12:17"
|
"pubDate": "2020-05-12 18:12:17"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "撒贝宁惊现滑雪场!硬核测评来了→",
|
"title": "撒贝宁惊现滑雪场!硬核测评来了→",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9BPIo8QLoEC_lu8ScaJKxGD9-S8LsNyq7vhHn8WWk2filE7c5ZGkw1by27scDSV9q6BoNp03By_ohkFhfL-9FAgQb7YxWHsEklzyKl78FV8v5UgPr4DyomQ0W08nr1Ts_5vL6-ETYerjVPoYai4WW49pAWUQqAwWLYiM6jy4dt_9S6t2rFt2rnA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9x0RJb1uNorPgftTZLUPMYVlZDZOF-ItpngMjL5_OQhtyJAC1niFDE3xedJ0Q-c9YK7OzjYe5rErOVTXm0YuEXeihQmdJDrXz4krcryH80BaDzo36v6augLSvWuqUMT2MlZ1qkxz1YqN4AKju0LLQnudKOXD3w9nMjpSJJYXMuL0NGbbB75bUeA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...",
|
"description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...",
|
||||||
"author": "央视财经",
|
"author": "央视财经",
|
||||||
"pubDate": "2022-12-30 15:14:23"
|
"pubDate": "2022-12-30 15:14:23"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!",
|
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX8qGBPQpmJmF1rRfrn5fJly2VvqaQ-XpG8Wpb2_-zIn6bxmOMqxLrTQLOuuanB1sYdZvgaEPHUQ_udxLIzJIJaLSwU6OPy1lUa_pYMPu4R-tVumWS8jpVoy54z_tGSZTqA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_lnK--ec5J8Kp0xDK-g8kILLzd12O0HZ4OoFf7W0lSmZ_hasEmvRVeRmKwlZVHhhdipSwrLaCIj1CgAwkQyNvoMHNAHD58iN5TzbZemadBLrGiQxtDpEzXpDP28temKTOwg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...",
|
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2020-07-10 19:38:53"
|
"pubDate": "2020-07-10 19:38:53"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "【提醒】妹子们注意!上海消保委测试了40款知名面膜,结果...",
|
"title": "【提醒】妹子们注意!上海消保委测试了40款知名面膜,结果...",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9BPIo8QLoEC_lu8ScaJKxGD9-S8LsNyq7vhHn8WWk2filE7c5ZGkw1TQOwn5G3LPFoeGO5WCEDfZNe6QZL1NIGM0VeHsxA5urCoIoQbUY1J-3cRF2qAGGnslLQ8KcPQcAuul1a1w-R5AvAZlJ2xqETo2iEl62_XqAsadlOaPc61ktPujwwRB2Pw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9x0RJb1uNorPgftTZLUPMYVlZDZOF-ItpngMjL5_OQhtyJAC1niFDE5DA8b3qGoK07-jKwuNMznSFYIVWmvTtqGJwxqqyTpCtsLGpwshnDWy6SyWI1U8Gf6mjKfhQJa_qNOaC9Y0rrh2ttqNR-Vd-F6CPpUS-HccJg2lh9jDcK9nwdVqCwyPdzA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "4小时保湿功效分别进行了测试.全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面膜...",
|
"description": "4小时保湿功效分别进行了测试.全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面膜...",
|
||||||
"author": "央视财经",
|
"author": "央视财经",
|
||||||
"pubDate": "2018-10-09 06:45:24"
|
"pubDate": "2018-10-09 06:45:24"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "李佳琦们要“转正”了!",
|
"title": "李佳琦们要“转正”了!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX2XNLJWGVtZrGSPoWA-po6Axj2CrwLkI6W7csg2ZrMwZt17z5yDXX6HQdz7ZfgPmpTjMhPRO7p-QXldvSR8sNIdXOd-6aVKXHM3nV99G0kF_8Ut3OBNuY5TFcvUoAZZH7Q..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_ltmxPJDZA3ERhpvTAtUQIBE-cXd7ILhdSIHwev-v059a5xj_sv3Obo4tmXMwTcXLqdxnSv8TP4L_feTSEGRqOLJUArx4zhhzYjVieNYvjcaea4tdSIGh_YkSYTqT4eyLmA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
|
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2020-05-12 19:02:37"
|
"pubDate": "2020-05-12 19:02:37"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "撒贝宁现身滑雪场,硬核测评“小汉堡”",
|
"title": "撒贝宁现身滑雪场,硬核测评“小汉堡”",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9QCpjvSjbD4VMiHiS6Jej9mDQtM6tDHgU2NR9YST4vm3iEQ4bmE2yk02M3hB3ZKMTnrW9eSQrLikycRLGkWlNpmLZ98gC2Oyx-bbMkKG0AcpkRnl6tX9H2npHvM8XU8Z6eP1WRk_fhw4cVHe0mMGuVfTg_etL_psPgGv70ysPZXq54z_tGSZTqA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd944tfK_MlGkvFg-1wKUtTQBcZrvur5p6CXLTCxDE8mrRRE9Ds1chuwLJBJ1R0W9b8tpzWT-5vinRA58sjDLWe24wVZH5z2zMYbzt72Z3WcYBCJyTB5ZP2nnK9d0H0dd6He199uOB79WpWQM0S06QYlUsmB85WxiIQvqZocoXk1MZe0WC6Sbi7DA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF",
|
||||||
"description": "层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如小撒也对极光小汉堡的防水性能刮目相看防水测试100分...",
|
"description": "层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如小撒也对极光小汉堡的防水性能刮目相看防水测试100分...",
|
||||||
"author": "央视新闻",
|
"author": "央视新闻",
|
||||||
"pubDate": "2022-12-30 18:03:44"
|
"pubDate": "2022-12-30 18:03:44"
|
||||||
@ -218,70 +218,70 @@
|
|||||||
"手机银行漏洞": [
|
"手机银行漏洞": [
|
||||||
{
|
{
|
||||||
"title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万",
|
"title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd9fPAEaSpFXxfae8BDlsMpqKDKzXpikguf1JnIOJ71rS9T6B1Ci9_KDPzxj-onF2fZdPfhdIcXYHOVkKtxCkFd_bh9rAkkbR7uxY-OzvxNEhvEQ3sVetUAFgB5hfnp7hwbeS5SeRmQq0lv-OfuKRSevGmV4sGsvp54P435H_cIa_sCYioxHkzTmA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd96wzNlDGKF74IS5Dmj4VFC_2tomzwFNMNnREdfnK4Mq3rooSKWN4ShnIg7A9Ec5Pb9lyxWlOS2bfFGsfmr5KHQiKvEXuHlqIv6YQqs2HwiTLuJnPeTm57LJpdDwhxMIQkv-7BeYBc8hd4KYJuwRyqMMoQbCQ5xcrut9FubXbdVv8Cn9lOoZLP2Q..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...",
|
"description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...",
|
||||||
"author": "木火通明",
|
"author": "木火通明",
|
||||||
"pubDate": "2019-04-23 21:42:11"
|
"pubDate": "2019-04-23 21:42:11"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现",
|
"title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd9ijJxckBNMIw2ONIiAAgQD0orZTwt52sxaQbBLPhNvKiwLwJEB2b8RPJNpWJsPOhDh0JfRVCw0pPHMt0_TuGoNx0Na-eMRsMPacmnLJzQCS_ZsH4040sKCA-L9rfXZZe8viuVGrdaHndRxZSm-4Kf-p229-kDQ-v09MbXGF3_9EnS-e4Yz84xMA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9TqUVhoJQx4ossYz4w_UeJ3L7oAZR8Z4AAVZt_7Vy-3g2rU5fmGOy_evytb21d7yZMgM06UVOBurDxKvIA2FZtHy1-_FzVsLb2tJ_c7MVxYP_5mHhVHd_yHy3b526gsyKBSl7OnbFIInI7cn8DwrViUZLkM8XabKSCqSEW5uEDWz1AfaFW2DefQ..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...",
|
"description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...",
|
||||||
"author": "支付百科",
|
"author": "支付百科",
|
||||||
"pubDate": "2020-03-19 19:33:50"
|
"pubDate": "2020-03-19 19:33:50"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "手机银行漏洞:五行代码可转走银行250亿美元存款",
|
"title": "手机银行漏洞:五行代码可转走银行250亿美元存款",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYsuEt3jaJd8_4YrAqrUNSCl45ZS13pkM7BPtp4uoFW7hbK7RW_-gzNADKbpYdWefeyiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYszliFOwjwLat5Gy4WXFwhaO2-P3TkgG_OCcmIvT_QvXpzcATxy1SWMo-tM0mwVyUniZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "一名安全研究员发现印度一家大银行手机应用存在漏洞,可使他轻松偷走250亿美元.去年年末,安全研究员萨提亚·普拉卡什在一家...",
|
"description": "一名安全研究员发现印度一家大银行手机应用存在漏洞,可使他轻松偷走250亿美元.去年年末,安全研究员萨提亚·普拉卡什在一家...",
|
||||||
"author": "安全牛",
|
"author": "安全牛",
|
||||||
"pubDate": "2016-05-19 11:48:56"
|
"pubDate": "2016-05-19 11:48:56"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "黑客攻击发现:多家手机银行APP存漏洞",
|
"title": "黑客攻击发现:多家手机银行APP存漏洞",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9_A1AQX6nXlQnF4S0o79mYUL5Owo7YEYZVEwoF7uCZkq0QzDzxkcKxqO__hkw14kXiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9Y09V-oQCQ__TOSZRUgUKweX_Rt2UzbkANv7DcsH7oyEfniYKmGysiT0PgF57dXMXiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...",
|
"description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...",
|
||||||
"author": "E安全",
|
"author": "E安全",
|
||||||
"pubDate": "2016-09-05 11:36:23"
|
"pubDate": "2016-09-05 11:36:23"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "某银行手机APP现支付漏洞3天被盗刷40多万",
|
"title": "某银行手机APP现支付漏洞3天被盗刷40多万",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzG3_-b7D05fUkhS2dCV9OXNE36jCXDB9M-os7L6Y-eOqtKNvldU87WWYxXAeTlg8hiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzzudrNNAcr6Uwh9bUJ-aLkndXx7A2o1ZW57bvlGLCwufwxQJ7_x-gBFrDKCo0G_yIiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...",
|
"description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...",
|
||||||
"author": "支付界",
|
"author": "支付界",
|
||||||
"pubDate": "2016-06-16 09:00:18"
|
"pubDate": "2016-06-16 09:00:18"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "警惕!手机银行APP也会存在高危漏洞",
|
"title": "警惕!手机银行APP也会存在高危漏洞",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksj3rJsloDZaWdhg33lCtO23AQAsZ3q6lwX4133lbIo7gy8Ms0DOToTvctecQCZ7xPiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksuAHTGFmi4QCtrwWPkBFO3yFjBPhEC83LpmH5c393FrSnlu5XmLNrwmVkOkEYBrOUiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...",
|
"description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...",
|
||||||
"author": "中国信通院CAICT",
|
"author": "中国信通院CAICT",
|
||||||
"pubDate": "2017-03-15 14:13:34"
|
"pubDate": "2017-03-15 14:13:34"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "部分三星手机指纹安全漏洞爆发 中国银行:App已关停",
|
"title": "部分三星手机指纹安全漏洞爆发 中国银行:App已关停",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd91yEjxg5etkiY8I05ZkcFL0nIvEBF5_g8o5RMTX_iAs_nm-9XiQA7EEJyd5Wg-dEJPcPyEw422pVmwHvWHUB7VYNk0yk9Ml3Vjx6cvMXlqGD4F4UGOt0mlHgopCQEf0bqYIOMiBW9fSZ-FnGfFUMCXFzVDPQXS5-M9_-pIgBW-HzuL0unUdKkuw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9KtxJ0CIOoVXVkQ168esAVbejdCKMQ0FErz14KHaT7XQ4eT-q3Be8p4txAAAFbIaPO3sC7tA4_PC_hRf5lpXh0RSxBLs1Z5YlsV__SfftHP-kiBuTt6c1KA7mKF7WdjMTO3VqKezJItSaGlY-UkeddGu8es5-jWvZZpyR_RtNzk2jotuuiAmOIg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "两款手机和Tab S6平板指纹识别存在漏洞问题,中国银行决定关闭手机银行(包括境内版个人手机银行、境外版个人手机银行企业手机...",
|
"description": "两款手机和Tab S6平板指纹识别存在漏洞问题,中国银行决定关闭手机银行(包括境内版个人手机银行、境外版个人手机银行企业手机...",
|
||||||
"author": "银行科技研究社",
|
"author": "银行科技研究社",
|
||||||
"pubDate": "2019-10-23 12:18:17"
|
"pubDate": "2019-10-23 12:18:17"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "有人利用手机银行漏洞疯狂作案30余起,崇仁人警惕!……",
|
"title": "有人利用手机银行漏洞疯狂作案30余起,崇仁人警惕!……",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd9kt_cpR-bPG0kD5wAUBIu0u1JVtacfwh98Ugm3ehSMzall6cemiDIOpPJV_E4tHnkDTbC92YPHQBUNCg5TK7X2a-hwy2T-6cnlIIV_Ql6oF2m0MvkUIKrecDciQZHEvrGK_zxjqYk9ms3MZX_VAzzRUmHHdwhzXvTZXgH5Qd66kNf_71bqkOtiw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9f9Spk8cQFi90pjUVtGTOH7dH1KeyQoJ1ag2aKmG_lshrXmY3kYK2lrY83F76rJ7bkr5pZhbFSpdPgkQZb1NjZTdXIadwXNND5dhCAhnzcKptUaLRlAD0sXg4ZU0yq5FjbSpIpjrhRbYiMWb52mVqw72OhhJA1but1wxyjIpC5kXuL0unUdKkuw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...",
|
"description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...",
|
||||||
"author": "乐享崇仁",
|
"author": "乐享崇仁",
|
||||||
"pubDate": "2019-09-12 22:35:10"
|
"pubDate": "2019-09-12 22:35:10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "警惕!有人利用手机银行漏洞疯狂作案30余起……",
|
"title": "警惕!有人利用手机银行漏洞疯狂作案30余起……",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd99mlF0A7yMALXW7mwfuxq-UcFznooBU5xpthqQqLOe2puE2gTOnKFcqv5h0LNpDTBlArlMgHctDJ8Qa6StRv7o5Zmz8hcmHa9AL1Abj0GMaA_LUDUi-VqaDCw8EW_IlnKo8UDKQVWW1XljufB1jPsn46FOcDw8ZTogywAZbCis970OK9DLfgmPA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9tWMpXSnRp5DF2fLqyrs0ORhZXGUEm6kR-IdIVZqgmiwRIeZVFf-LbKjZ-cVB4efOtU-sPWzWKza7vz-4v_yXQSa51uoJaZK87V7EaDi3zFHhG_Av5MuP0ksy8zr8iMcBsJcwvzJQuaChAVdIO9S55tYomrtJ4xsQ10PqKwej0dpOJBjQH7pCxQ..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...",
|
"description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...",
|
||||||
"author": "玉山生活",
|
"author": "玉山生活",
|
||||||
"pubDate": "2019-09-15 17:21:04"
|
"pubDate": "2019-09-15 17:21:04"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "【警惕】当心!手机绑定银行卡,这个安全漏洞很危险!",
|
"title": "【警惕】当心!手机绑定银行卡,这个安全漏洞很危险!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUagADWgAB_8d3tAGKyj45KEoeIpC-s0dCPCKrXYMy4_9_3ytPzCl-d1qcPmS2LY4JjiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUanMkpA6ZSJLMFU71W6gTYwdefTnWcBudO3Oc0O14ztlN9E9V_7fMzmy2CmBrRDzpDiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704",
|
||||||
"description": "手机丢失后先做6件事↓↓↓01致电运营商挂失手机号02致电银行冻结手机网银网络时代,这点特别重要!重要!重要!03手机绑定过支...",
|
"description": "手机丢失后先做6件事↓↓↓01致电运营商挂失手机号02致电银行冻结手机网银网络时代,这点特别重要!重要!重要!03手机绑定过支...",
|
||||||
"author": "集宁佰事通",
|
"author": "集宁佰事通",
|
||||||
"pubDate": "2017-01-20 11:26:29"
|
"pubDate": "2017-01-20 11:26:29"
|
||||||
@ -290,145 +290,145 @@
|
|||||||
"银行漏洞": [
|
"银行漏洞": [
|
||||||
{
|
{
|
||||||
"title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?",
|
"title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd98XvXEKD25NX6fFkj6ypfZpEleWRT0-zrb0y2ksPWB0hCZa5M_GffioYP7XWySX2IgoOYoA_VtEygDb2d8ClozWAWyKDgpj-KuEqOSQhN2q72Q7l755R7slClKCTTWKS1YOfrh1pswOKaugDOWbuRrlAU04b1nGqdry6eRJDZAHLy08OLTBhW0A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9gWPGT2YFt0MRSMKl_hVc-wGTiVPjNHbKazFOBPgpqyq1-YmPnEZuty7Dv5WNsgVeEDaUgTtevmTqtWVlfiO6DWDkqJN8BqgAdlluIVCSnYfC89S8nJkok255_aqO-DCgSI1PFwt6aLqFdleiiOKEp3C8CzUwWsCZABWmPOSX_4ZQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...",
|
"description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...",
|
||||||
"author": "测试届的LV",
|
"author": "测试届的LV",
|
||||||
"pubDate": "2019-06-10 08:18:15"
|
"pubDate": "2019-06-10 08:18:15"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”",
|
"title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9the489nMZTrRM-XiN0wAJS0Ym_01yhUvKd6BHAvqjaLdvSGG1CxgULZG3ha2ETji1FdSP89up2VoDTzKeVNubwaoDcVsKVAwif_kcwLnQPRw5kFShQkUkNc-BP7LNPAhoZmr7jsEJ0DxmcFnVYFC_LDTGB6n0XrwP-BiVSFG9nvy08OLTBhW0A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9ciUS0Af6iifXpaqWUC3uErufLBF5RcFUARX5kV3Oft-HAWOaUoc3BIYdhzRhF1EQVj3bfxjyLZFkbT2uK6CeOAVU8PAqyxtzvoKVLwz5zmIonsj0F_o7SGEicbor4sAZxqEKRV7ptLFh5ustzG-uZO9OpX5NCDMhC-73szG0dGlQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...",
|
"description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...",
|
||||||
"author": "新浪财经",
|
"author": "新浪财经",
|
||||||
"pubDate": "2020-07-21 15:52:31"
|
"pubDate": "2020-07-21 15:52:31"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?",
|
"title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9YglTSPBY73UVBVfCyPBM__Gf5YGPS_Bj7SfT1EIH8IyvVr34PjFWfrKthy01X3LANqhKMiac9lptbpW1SwKDvAlRs9QsbW-se_0WCpsQtg0PCxoVK31JriHyCvT02s3dYfQYplz82Nmg5_a2bLQwgBlfCxFmYnIi3wWLVbag0bhhlgeRt7bSzA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9OOw8_9mc-EQXpPeuC6_q4OIqmBrisCMegr5A7FCAxlWQ8ooTNyrcgJJMFngN_0e8dF6ItmxI1Ze2-sAuum6HNV5T8egjGSmQq7NjSGgd1tooa3s_iTlxFhzkGp3e1caodCXw3iawr2hdlYvNM3veArVLzwcuyj1VDWKBf2DH4vjRtmyIGw2VAg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...",
|
"description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...",
|
||||||
"author": "纽扣资讯网",
|
"author": "纽扣资讯网",
|
||||||
"pubDate": "2018-08-21 19:29:05"
|
"pubDate": "2018-08-21 19:29:05"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放",
|
"title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9XwF5OfuwLiwn84vZXvJ4dBt4iAqSs2CIC13kr1UbI3ypvWBQyC9QB_u5IGeonYqb7SBVvnI5e7lKTjfuzHtJYpU_EqxULy97EGfcl9S1lr3qzvzynmH7wxNmZMZwfWJ-dvihKku0ApLDfS1jMSzIM-9g54S14GDnD0hS4aQStUR5Nu7CnoSqqg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9bMbVZh9G-lAyg6D15CQudGl36ycyUxQn7klg_G3Pnvjd7Bw05tJxwbeMN5xjTcZc8SkK8H_DQG1djWxlJdPzMyJcsBvoN0E6-y7Cal_KdOGNhrSDVDSzS6qpSxR1zTpUINKNpEXNycHXjTeLBig7jLb5Gnd7QQJ-O6QCJf9EXnU5eBgmN3LoYQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...",
|
"description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...",
|
||||||
"author": "外交之声",
|
"author": "外交之声",
|
||||||
"pubDate": "2017-12-03 23:54:42"
|
"pubDate": "2017-12-03 23:54:42"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "2014年浙江大妈发现银行漏洞,一月内偷走5亿,警方:银行的责任",
|
"title": "2014年浙江大妈发现银行漏洞,一月内偷走5亿,警方:银行的责任",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9tLqsRfiKt2fcmnJvyG1JPGso0xteYU7eLR8AuGjNEhMPKILCiQeYE5SmV30yzXRecuMT18woYDZjeAkLa7NY8YlORktwzCWZnX3eWNitozAcRICchLoVjBiQ8CX6S7JU5hUj6SM13FlxwsjMq0TTDKyXJkalD7xEOJFXlkKKI-eAFV_3u-a3OQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9tdbu_BCHj7gmdtoqTtPjoSiSJBviI1AQwHcC_7PrOmM4BOKrgb4aVxzRL_R6aO8zHIjezUqftVn3aiFIHfJxCJpOOD3pdXrx71Zv5EwW2MEju3GdmUn8etx3YQk6RGx2Im1VetVSPME6lm6Ga8YquvNDggsNUKufMbs_NBw5xqX6zvkPgoArRQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "她成功找到银行的漏洞,在一个月之内挪走了多家银行近五亿元的存款,直到一年后才东窗事发.事发后,涉事银行却推卸责任,引起...",
|
"description": "她成功找到银行的漏洞,在一个月之内挪走了多家银行近五亿元的存款,直到一年后才东窗事发.事发后,涉事银行却推卸责任,引起...",
|
||||||
"author": "知书局",
|
"author": "知书局",
|
||||||
"pubDate": "2023-02-03 18:20:39"
|
"pubDate": "2023-02-03 18:20:39"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "21岁女生利用银行漏洞奢靡消费近2500万元 被无罪释放",
|
"title": "21岁女生利用银行漏洞奢靡消费近2500万元 被无罪释放",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9lJ5xF9ayVllVDmBWDFddB3A0ze8ILrxRj_Rn0wVXNu-5NdN5ylRK8R_iw2zXyhwzVoGZz01im9bl7iTW1ee2fgayLpJyZZ9z2_mqrFBNm2t3oFDq5ZALjafoVLHWJlsJdIcvkG7cYpWdYJr73NsMTPfiv55fN35LLy7844tQScNhWLv6O878UA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9CXy-yCeecAnXBp1uj5JxMvi5z9rQIf3ATdmLZ1at7xjp8x3_Xk047tAdz6SA_wGn18dbFWdON5PYrQVPpGYpJm7-uaYawjuFKT4XLncW_H1cYD_J3zPIvpwJL2n7syTthDpURfL9cC70Tj4k0liD8pJmBS3T1-y56tKEgcMwF7O00NVofL2iDw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
|
"description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
|
||||||
"author": "澳网",
|
"author": "澳网",
|
||||||
"pubDate": "2017-12-04 23:18:55"
|
"pubDate": "2017-12-04 23:18:55"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "让人惊悚的网络诈骗系列之“银行漏洞骗局”",
|
"title": "让人惊悚的网络诈骗系列之“银行漏洞骗局”",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd94AGs_6GEpTEOlIDUJWpFLKY35QhP39XQAD2Hjr1EM66fOP8I0uz41ODKxAASi5XO2BwG_GhfAyozzkibN-RyuMjJxUs5GUqRjOh5hvCpWBZRuzTxEfDsKaRiuOXCj7B21oaiktXepiCDsyZdbVYcYRLkCWxQVmNH5hPSIR8jY1BhlgeRt7bSzA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd97RQlw9ARSObMmAMST-tMYHm5H8PwHV5MtMOqMXMaiZMy2xBM1tUCTdJDYByc78GD_WCvHsSJv4w1uTTX67R0h2ahlO3eM2OvKwCqXBtJuxQuUop5MkL35ZFCUy586Jr-V5s1FVwtdW642-ABsmQwQ-w0MuWxN0GbYPtB6uQN9XpFH6In5Ei3zg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "随着网络环境的日趋复杂,网络诈骗也愈演愈烈,骗子可能不用偷你的银行卡、不用拿走你的身份证,只需通过一些手段获取你的私人...",
|
"description": "随着网络环境的日趋复杂,网络诈骗也愈演愈烈,骗子可能不用偷你的银行卡、不用拿走你的身份证,只需通过一些手段获取你的私人...",
|
||||||
"author": "火绒安全",
|
"author": "火绒安全",
|
||||||
"pubDate": "2017-09-11 17:23:47"
|
"pubDate": "2017-09-11 17:23:47"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿",
|
"title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9grUjhSztIpxVqenVsHUGZh__-mG7bPlAymoA4Bvf4Vp9dk7gIbKJ8YWHCC_tuCcsKDQCkyemmn68lSX7JrwtNfFcpGBOjjnHgUOY4BV6vZNh5ssu64OjFc0OzN30N3exJFjQhSGSwP83Csa1ZI-6x0BxIDV3mqpDZPOBGv_nWyvuL0unUdKkuw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9JWIii1OV4DeupK5w1LZdS3aKg6DiTzSGUIEe63-1x2dVEpo7HsSHq0WTk3o0pRu0CYzj1CeYZxM8gtOVbJ3r1CrIQPNy23Klq25un2nkFVaLV3crQEQ_CaGU7UhG4M4h01NBKQJ__ziP_bwu7BCADP5WQf9ocWE-piDaYUNx_z1Q_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...",
|
"description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...",
|
||||||
"author": "灵枫历史阁",
|
"author": "灵枫历史阁",
|
||||||
"pubDate": "2023-06-04 17:49:26"
|
"pubDate": "2023-06-04 17:49:26"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "日报:银行漏洞一张支票可兑付多次;专家提示不要指望会降息",
|
"title": "日报:银行漏洞一张支票可兑付多次;专家提示不要指望会降息",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9-ZWZ2PHumi7RwfCGcnSI1EEJ4c3z7RFK_xmye9XIRvNsWWpB7oTFg8ile_gcSisdTSI0xxvQ5QnsdCIbp8ptCi-INS9GA1ymH-Owiw3PEGRBwWKE8gKnqfSPjeNpoGEmSVo4F3tSb81SXDQULMjREtgtxVBCitrDMKpDs3NYILuTJmCU1UgHwQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9hcsF-n47gQuRy0e9Yr0mNOs3CYncPzlszK9CJvS0lH3S0SeTk2yaoDvzg9ACC-gIlAA7WO-UEIS0LMOX7DAq_hoscBAwzHg7hlxDFXFzetAD-_KD0-hCBQLgvKP9eiodDKJvKnwZ0WkwQrD-EodvSwONeKcgqwu1qlUJUhk2iBVQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "银行漏洞一张支票可兑付多次卑诗企业主以亲身经历发出警告,称该公司一名前员工多次使用手机银行兑现多张支票.Glacier Media报...",
|
"description": "银行漏洞一张支票可兑付多次卑诗企业主以亲身经历发出警告,称该公司一名前员工多次使用手机银行兑现多张支票.Glacier Media报...",
|
||||||
"author": "城市知道温哥华",
|
"author": "城市知道温哥华",
|
||||||
"pubDate": "2023-10-09 06:55:35"
|
"pubDate": "2023-10-09 06:55:35"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "黑产利用光大银行漏洞,信用卡1万额度可提15万",
|
"title": "这几种套现方式钻了银行漏洞!竟没有被封…",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9YuaXX5I7Blccef99ne-2EIhqkZKehrz2jzlhA9fdpKOiIrdXgWSF9gM5LymyAsqAGL-hJnheY-sczKHmEQMc--omRBFmDI1Ccv1KhlVSo0qHbS0NV5b75zTb-Byz9IG9DUJ78Csr_WM0NoROpsxEcDgootiglj8AOLQbQu07PT-q3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9aAGWbb4TAN9RhbkWboIST0VbhdfgzrPfN6ym34UZ4cWeR3LKTWam7NRzPN8kJ4jjfXGR3kktRId9pcv9KYpkSnhvZ_qJL7JjiAor7BWcD3tYjgSrM5ii__7dKWW95dVBqtEv-jlnEYD8ierLzdRYuv3JbcJua58Xpeoi6bu8Tv4Cn9lOoZLP2Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709",
|
||||||
"description": "5月25日,雷锋网宅客频道(微信ID:letshome)从网络安全公司紫豹科技了解到,其情报团队监控到一起银行漏洞事件.紫豹科技相关...",
|
"description": "不过随着银行监管越来越严,很多卡友也受到了处罚,卡姐有个朋友,堪称“套现小行家”,用信用卡套现了5万元.仍然在银行保持...",
|
||||||
"author": "可转债摊大饼",
|
"author": "来谈钱",
|
||||||
"pubDate": "2018-05-26 13:15:31"
|
"pubDate": "2024-03-17 18:02:42"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"支付漏洞": [
|
"支付漏洞": [
|
||||||
{
|
{
|
||||||
"title": "史上最全移动支付漏洞案例 谁动了银行卡里的钱?",
|
"title": "史上最全移动支付漏洞案例 谁动了银行卡里的钱?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05js-fjST8gcDG-VgrFeYQugDqr95PEUjTPeCjEDtUWlMFjnjBVP8MvhBB3rS-ONO8kWUyXnYwgoFpUbgnrKgIxixCCgP3PeeOCp-4-KGyD-MDLGBaPQAm5n4u5TKu2pEERBbVp5wVG_sJnPLaqVLQTbtqO8XPmq69L45iqF-gaWWwGT45bziwKiEvYbrg2FCKNgZu8tviIIT75g9oJnjSeXJTBPJukiy0atEmChO0frq5n8JGLH2LKcbH3Qi9ySg6yniZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWItiB2hNdosImVgrFeYQugDqr95PEUjTPeCjEDtUWlMFjnjBVP8MvhBB3rS-ONO8kWUyXnYwgoFpUbgnrKgIxixCCgP3PeeOCp-4-KGyD-MDLGBaPQAm5n4u5TKu2pEERBbVp5wVG_sJnPLaqVLQTbtqO8XPmq69L45iqF-gaWWwGT45bziwKiEvYbrg2FCKNgzjtdQnSq0TvpYxUSn2SWuSQM4RtqS0rAYm6SIZ_Y8Di1eENg0LGTN6UZDNPA5PaEiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
"description": "雷锋网硬创公开课-移动支付漏洞案例@GeekPwn随着移动支付的普及,我们的生活变得越来越便利.我们甚至已经可以不带钱包、现...",
|
"description": "雷锋网硬创公开课-移动支付漏洞案例@GeekPwn随着移动支付的普及,我们的生活变得越来越便利.我们甚至已经可以不带钱包、现...",
|
||||||
"author": "GeekPwn",
|
"author": "GeekPwn",
|
||||||
"pubDate": "2016-04-19 09:35:10"
|
"pubDate": "2016-04-19 09:35:10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "手机支付漏洞已成盗刷之源!小编教你如何防范!",
|
"title": "手机支付漏洞已成盗刷之源!小编教你如何防范!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05js-fjST8gcDG-VgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZn_QnfHYVxrjFBHWq66HXNYTtlU5ZEhjdBmpZs2I0tlE3pUxzRkNegYGNmjurPsOgiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWItiB2hNdosImVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZGd3u2FRtBg_TPwWOr1utChU56Fq8cOajnpbA21TbCMRlHDkHEkzycMpeUPCA-4pxiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
"description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...",
|
"description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...",
|
||||||
"author": "电脑爱好者",
|
"author": "电脑爱好者",
|
||||||
"pubDate": "2016-05-20 17:30:26"
|
"pubDate": "2016-05-20 17:30:26"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "就一加手机支付漏洞讨论在线支付中的安全风险",
|
"title": "就一加手机支付漏洞讨论在线支付中的安全风险",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9OA-y9C60IE-npO37WN82TlW0SZ-ySzWn45G6zLFp6I1yj4loMO3bfrFmQsylociJLjS-mnBLJuoMu32Rxtsxlr4lo_Z8-Lok-wp9h25dKO7utld1wWLMrmY6bEwRvr7jqxjgki4oBcL8e-taz9vzwD3GLxYY4q1fOy4T1mDuUHJe0WC6Sbi7DA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9LsR8mCWefbx3cRV0BDuy9-sdS8Et4AYhxzRiOWF_GvxKIWXmCO8iqcxtcMtoMGVI0FPHpPppGIPZ6N8Ry8WRM4dEwMyV7gNJejzSauxOOWCQQhHpymInuNtGHXfK3osV6y8Z2YTUAaW6mOqWu7JVEcsjFMvTzhv5UAckkOmnE22rCDCayYmfpA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
"description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...",
|
"description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...",
|
||||||
"author": "FreeBuf",
|
"author": "FreeBuf",
|
||||||
"pubDate": "2018-02-12 19:17:27"
|
"pubDate": "2018-02-12 19:17:27"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "天融信:《电子支付漏洞报告》重磅发布!",
|
"title": "天融信:《电子支付漏洞报告》重磅发布!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9HLpnE2kVZd1IeNEEadfYBn1loyl1Z-xCgV8ehiYbGHBG_OjiU-GEtAvlLjYH1bf8nBpoZHfKFW50XhDAUifGmms-JrmgtyPsh3RmVxqbNzyY29jqn0GC64yQtkEf0-c9WKZe-yP6TX1f-9A3XG6ZpGgCDhVybA7L-WkjZCD1Lwk5eBgmN3LoYQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9zWZZE-CJlhxBllPbnGftsuo2yzQQ7DoYaDAc35Wc1gHG4zEx24qN38avdW_nVTmJJasOsiGxpjAhLRLR_bWnYXSmQAJ4RYHZusjo8fsF3as-7bxMCRNYGBt2gP4F13EF2BVetJ1ic-KA3iBkc47k3waZ61g6kc6p3rW5u1uPassNGbbB75bUeA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
"description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...",
|
"description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...",
|
||||||
"author": "天融信",
|
"author": "天融信",
|
||||||
"pubDate": "2023-07-12 18:21:06"
|
"pubDate": "2023-07-12 18:21:06"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "银行卡免密支付漏洞这么大!",
|
"title": "银行卡免密支付漏洞这么大!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05js-fjST8gcDG-VgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20x5JWHrDlTUo9CT21SzH5qvJuYARiyPAoZSVbUHFSJ9tCZB-UEOs5lWi13R8piIn5kiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWItiB2hNdosImVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xb7RsigplhBUo_xhNO4jppq1LRZiE0127V9uNpApYrOpd7dWJLorCgjQt21IQKWxPiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
"description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...",
|
"description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...",
|
||||||
"author": "犀牛生意经",
|
"author": "犀牛生意经",
|
||||||
"pubDate": "2016-08-29 09:23:44"
|
"pubDate": "2016-08-29 09:23:44"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "敏付科技存“支付漏洞”被约谈整改",
|
"title": "敏付科技存“支付漏洞”被约谈整改",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9T7MSItBWUDi6aBtqRJl8vLhibdQpcX9KHK_9pINJAT4FktBvm82SMRpvfx7KRgsW4OQml8kzCMCwukpjvXw1XMhXUljTQZP_Dm8QZubiEB2Wzh2C3Apz7t0e4o8K7SU9wYA2xyLzKOfWoJb2ktKwyzJcQXWJ9t9nw7KM6M30HoTYl_Q5RRZQjg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9ZG6ahmSu_TZtqLkv3mqVjj-0qnUDQGbIbLKGI3lkUNYD3QVubl9Q9uPOIrdYB-Goe_HVonN362zKOf3iI4fk0Acp47FblPvt4M5GW4TCy9es8t0XIeOITzENXDz4EVTsxYuoZGSM05JXTC6QorS_ZbXDgN3hd_aCZRpPBzAnE29j32-j2KiwUw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
"description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...",
|
"description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...",
|
||||||
"author": "支付之家网",
|
"author": "支付之家网",
|
||||||
"pubDate": "2022-01-24 08:00:21"
|
"pubDate": "2022-01-24 08:00:21"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"title": "聚合支付漏洞被利用,新模式主犯获刑",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9kplfVXQebeHfZxhQ4pYSosUiELUgx_-egE2_6OaZMIGwTxmAQc6RsY3k1QC-YTOGcZZ2bM3Tid9EPPmnw1K2S6wchB0dB0GfAAO29TkBgnUmXcLybh-yLBVkyCSurjpOj9tdoocz-kxUrMl_1_2KpqRFL0D6g93EQD_NLMygZzz0OK9DLfgmPA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
|
"description": "一些不法分子利用这一漏洞,通过搭建非法的支付通道,进行如信用卡套现、信用卡代还等非法活动,严重危害金融市场的稳定.信用...",
|
||||||
|
"author": "蓬博看支付",
|
||||||
|
"pubDate": "2024-12-10 12:00:18"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"title": "利用支付漏洞套现1300万被判15年",
|
"title": "利用支付漏洞套现1300万被判15年",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9ijJxckBNMIw2ONIiAAgQD0orZTwt52sxaQbBLPhNvKiwLwJEB2b8RGz9sddV35XEd1tlMDaDHLCaYNpK_xdB_Z2v0AztsETHJ15Ppg0A-HsOyHqMXXU4bszK6kpOJ16P1vLsZk690W2OIuJza-W2HFt2BhuAy6kbEhHkzLhEHNLdrgozfSg6bw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9TqUVhoJQx4ossYz4w_UeJ3L7oAZR8Z4AAVZt_7Vy-3g2rU5fmGOy_Xgwm5Tzklzx4lq-owNROYVnB0lcTKZnRREuFG6mTp-dhFEoI-_XQho4W-IkK57ivSR7_erNh1nU3HilLm2tdz7_6-uKAsofK0kvkjXafyOf88NRua3oSAo5eBgmN3LoYQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...",
|
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...",
|
||||||
"author": "支付百科",
|
"author": "支付百科",
|
||||||
"pubDate": "2022-01-03 13:54:08"
|
"pubDate": "2022-01-03 13:54:08"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "某小程序的支付漏洞+任意地址删除",
|
"title": "某小程序的支付漏洞+任意地址删除",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9v5SVMkK_FaY4t9Rq_tvTCDq3JK1LD5qKq7j_abZgfHRDa3Xz345a7lmyooHcu-9Oq-RX4K2AWqz5u8hQyZzsf8RbseD4nJh2td5Kue-f8lIqaOo268sgxzBJHQNy44VdZoHZCerA2BM3-fxCuQZ1xXh-3tgxYpSLLp9hDG4DuBdS6t2rFt2rnA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9GU3OPDb_otSqQiEv8MR3-NGCLvsqrVRWAPiv9Wk6CinqHRXRRzfpTkGgPGCEeEIqyClz1EMAHPUktnugMohsXOs8oTkiEy4JH08zucA2JuYY1E4GoLNKjIumVKzvDtdIb7bBjJmb_hd5QGDTiv5a0vlqdAix_fBzlEfPY8Ym1_KjotuuiAmOIg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
"description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...",
|
"description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...",
|
||||||
"author": "狐狸说安全",
|
"author": "狐狸说安全",
|
||||||
"pubDate": "2023-09-14 14:25:44"
|
"pubDate": "2023-09-14 14:25:44"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "从最近的微信支付看XXE漏洞",
|
"title": "从最近的微信支付看XXE漏洞",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9OA-y9C60IE-npO37WN82TlW0SZ-ySzWn45G6zLFp6I1yj4loMO3bfivnagF8mYgB2rsrNTDEkBApV8-AR7AUMkA9EEK8Aw1AdcG9aMx2QUkIhuszZNfcrNj-h1FCBP0PelgoHGhR28PH_o2UFD_tQBMNt7Adu4CGcPaBna-erXM5eBgmN3LoYQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9LsR8mCWefbx3cRV0BDuy9-sdS8Et4AYhxzRiOWF_GvxKIWXmCO8iqSIGjvA8cRBT9cyf8EbLF5XocZLHa0NElvNOSTb7gjfMYezZnNj-RBSQGxQWzOeKs5UWmGELAwG3v2qgz-KRtuu4A640RVoCI4PkDSCfsq54aFTA8pFs_v0Cn9lOoZLP2Q..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F",
|
||||||
"description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...",
|
"description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...",
|
||||||
"author": "FreeBuf",
|
"author": "FreeBuf",
|
||||||
"pubDate": "2018-07-08 18:03:00"
|
"pubDate": "2018-07-08 18:03:00"
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "渗透测试之支付逻辑漏洞",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9UUGtPtyVVNZTv9xUlnGtgS1JYoH7mxQh0H0hQ1X6jRYjs-2iVyuUDzEFvN1xmyxKHyZcXM9YDsTRZLkBtDBZbyO4mTSVLqgnFJ_2Uy17j8jC0fMZuEqAZzdnhwE9jcwlgOKsWBR6u9eTlYP5ju4PjerW_iZb4iJEW_1sV_1wLNhCy6umSSPEsg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
|
|
||||||
"description": "支付逻辑漏洞分类:1、支付过程中可直接修改数据包中的支付金额这种漏洞应该是支付漏洞中最常见的,主要针对支付宝等需要第三...",
|
|
||||||
"author": "黑白之道",
|
|
||||||
"pubDate": "2020-05-03 10:23:30"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@ -1,25 +0,0 @@
|
|||||||
#### 大佬 su18 上传了一个新工具:[woodpecker-plugin-template](https://github.com/su18/woodpecker-plugin-template)
|
|
||||||
**项目描述**:woodpecker-plugin-template
|
|
||||||
**上传时间**:2024-12-13 08:47:27
|
|
||||||
|
|
||||||
----------
|
|
||||||
#### 大佬 su18 上传了一个新工具:[closure-compiler](https://github.com/su18/closure-compiler)
|
|
||||||
**项目描述**:A JavaScript checker and optimizer.
|
|
||||||
**上传时间**:2024-12-08 05:13:17
|
|
||||||
|
|
||||||
----------
|
|
||||||
#### 大佬 projectdiscovery 上传了一个新工具:[nuclei-templates-ai](https://github.com/projectdiscovery/nuclei-templates-ai)
|
|
||||||
**项目描述**:Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage 👾
|
|
||||||
**上传时间**:2024-12-04 01:46:51
|
|
||||||
|
|
||||||
----------
|
|
||||||
#### 大佬 projectdiscovery 上传了一个新工具:[nuclei-templates-test](https://github.com/projectdiscovery/nuclei-templates-test)
|
|
||||||
**项目描述**:Nuclei Templates test
|
|
||||||
**上传时间**:2024-11-18 10:30:37
|
|
||||||
|
|
||||||
----------
|
|
||||||
#### 大佬 su18 上传了一个新工具:[CVE-2022-25845-In-Spring](https://github.com/su18/CVE-2022-25845-In-Spring)
|
|
||||||
**项目描述**:CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!
|
|
||||||
**上传时间**:2024-11-08 08:24:12
|
|
||||||
|
|
||||||
----------
|
|
@ -1,182 +0,0 @@
|
|||||||
#### 文章:[恶意软件通过木马 VPN 应用和 SEO 投毒传播,推测其目标是中文用户](https://www.freebuf.com/news/419140.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 13:42:35
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[LegionLoader滥用Chrome扩展传播多种恶意软件](https://www.freebuf.com/news/419136.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 11:38:08
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[大量恶意npm包盯上了开发者](https://www.freebuf.com/news/419131.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 10:58:21
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【情报】大型泄密库搜索引擎-libraryofleaks](https://www.freebuf.com/news/419128.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 10:43:48
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[知名化工巨头被勒索攻击,泄露761.8GB数据](https://www.freebuf.com/news/419127.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 10:41:31
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[2024年度十大网络安全热点事件盘点:时代暗涌下的安全危机](https://www.anquanke.com/post/id/303291)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:微信
|
|
||||||
**上传时间**:2025-01-06 11:00:15
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[关键截止日期: 在 2025 年 1 月 7 日之前更新旧 .NET 域名以避免服务中断](https://www.anquanke.com/post/id/303282)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:TheHackersNews
|
|
||||||
**上传时间**:2025-01-06 10:52:56
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[项目隔离: PyPI 抵御恶意软件的新防线](https://www.anquanke.com/post/id/303279)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:48:40
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[CVE-2024-12912 & CVE-2024-13062: 华硕路由器面临风险](https://www.anquanke.com/post/id/303275)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:37:22
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[35+ 款 Chrome 浏览器扩展程序遭入侵:250 万用户面临风险](https://www.anquanke.com/post/id/303270)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:21:36
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过恶意 npm 软件包对以太坊开发人员进行供应链攻击](https://www.anquanke.com/post/id/303267)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:11:35
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[每分钟就有 4,080 份记录在数据泄露事件中受损](https://www.anquanke.com/post/id/303288)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:helpnetsecurity
|
|
||||||
**上传时间**:2025-01-06 10:09:03
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[SysBumps:在 macOS 上打破 Apple Silicon 的内核地址空间布局随机化](https://www.anquanke.com/post/id/303264)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:02:40
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[现代 CISO 是组织成功的基石](https://www.anquanke.com/post/id/303285)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:helpnetsecurity
|
|
||||||
**上传时间**:2025-01-06 10:01:09
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[CVE-2025-22275 (CVSS 9.3):iTerm2 修补了暴露用户输入和输出的重大安全漏洞](https://www.anquanke.com/post/id/303259)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 09:55:57
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[黑客针对Google Chrome的数十个VPN和AI扩展以泄露数据](https://www.anquanke.com/post/id/303256)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:therecord
|
|
||||||
**上传时间**:2025-01-06 09:51:53
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[恶意软件通过木马 VPN 应用和 SEO 投毒传播,推测其目标是中文用户](https://www.freebuf.com/news/419140.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 13:42:35
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[LegionLoader滥用Chrome扩展传播多种恶意软件](https://www.freebuf.com/news/419136.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 11:38:08
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[大量恶意npm包盯上了开发者](https://www.freebuf.com/news/419131.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 10:58:21
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【情报】大型泄密库搜索引擎-libraryofleaks](https://www.freebuf.com/news/419128.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 10:43:48
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[知名化工巨头被勒索攻击,泄露761.8GB数据](https://www.freebuf.com/news/419127.html)
|
|
||||||
**类型**:资讯
|
|
||||||
**上传时间**:2025-01-06 10:41:31
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[2024年度十大网络安全热点事件盘点:时代暗涌下的安全危机](https://www.anquanke.com/post/id/303291)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:微信
|
|
||||||
**上传时间**:2025-01-06 11:00:15
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[关键截止日期: 在 2025 年 1 月 7 日之前更新旧 .NET 域名以避免服务中断](https://www.anquanke.com/post/id/303282)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:TheHackersNews
|
|
||||||
**上传时间**:2025-01-06 10:52:56
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[项目隔离: PyPI 抵御恶意软件的新防线](https://www.anquanke.com/post/id/303279)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:48:40
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[CVE-2024-12912 & CVE-2024-13062: 华硕路由器面临风险](https://www.anquanke.com/post/id/303275)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:37:22
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[35+ 款 Chrome 浏览器扩展程序遭入侵:250 万用户面临风险](https://www.anquanke.com/post/id/303270)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:21:36
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过恶意 npm 软件包对以太坊开发人员进行供应链攻击](https://www.anquanke.com/post/id/303267)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:11:35
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[每分钟就有 4,080 份记录在数据泄露事件中受损](https://www.anquanke.com/post/id/303288)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:helpnetsecurity
|
|
||||||
**上传时间**:2025-01-06 10:09:03
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[SysBumps:在 macOS 上打破 Apple Silicon 的内核地址空间布局随机化](https://www.anquanke.com/post/id/303264)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 10:02:40
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[现代 CISO 是组织成功的基石](https://www.anquanke.com/post/id/303285)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:helpnetsecurity
|
|
||||||
**上传时间**:2025-01-06 10:01:09
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[CVE-2025-22275 (CVSS 9.3):iTerm2 修补了暴露用户输入和输出的重大安全漏洞](https://www.anquanke.com/post/id/303259)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:securityonline
|
|
||||||
**上传时间**:2025-01-06 09:55:57
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[黑客针对Google Chrome的数十个VPN和AI扩展以泄露数据](https://www.anquanke.com/post/id/303256)
|
|
||||||
**作者**: 安全客
|
|
||||||
**来源**:therecord
|
|
||||||
**上传时间**:2025-01-06 09:51:53
|
|
||||||
|
|
||||||
----------------------------------------
|
|
@ -1,900 +0,0 @@
|
|||||||
#### 文章:[结合阿里云通义灵码辅助新手小白快速代码审计的最佳实践](https://forum.butian.net/share/4011)
|
|
||||||
**来源**:subject
|
|
||||||
**上传时间**:2025-01-06 10:00:00
|
|
||||||
**描述**:本文介绍了作者在数据安全比赛中遇到的一个开源框架的代码审计过程。作者使用了多种工具,特别是“通义灵码”,帮助发现了多个高危漏洞,包括路径遍历、文件上传、目录删除、SQL注入和XSS漏洞。文章详细描述了如何利用这些工具进行漏洞定位和验证,并分享了使用“通义灵码”的心得和体验。最后,作者总结了AI在代码审计中的优势和不足,并展望了未来的发展方向。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows进程](https://forum.butian.net/share/4002)
|
|
||||||
**来源**:subject
|
|
||||||
**上传时间**:2025-01-06 09:00:02
|
|
||||||
**描述**:进程这个观念我们现在都已经很熟悉了,进程是一个程序的运行实例,进程我们可以看做是操作系统为应用程序提供的资源容器,比如内存空间,文件句柄,设备以及网络连接等等。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[结合阿里云通义灵码辅助新手小白快速代码审计的最佳实践](https://forum.butian.net/share/4011)
|
|
||||||
**来源**:subject
|
|
||||||
**上传时间**:2025-01-06 10:00:00
|
|
||||||
**描述**:本文介绍了作者在数据安全比赛中遇到的一个开源框架的代码审计过程。作者使用了多种工具,特别是“通义灵码”,帮助发现了多个高危漏洞,包括路径遍历、文件上传、目录删除、SQL注入和XSS漏洞。文章详细描述了如何利用这些工具进行漏洞定位和验证,并分享了使用“通义灵码”的心得和体验。最后,作者总结了AI在代码审计中的优势和不足,并展望了未来的发展方向。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows进程](https://forum.butian.net/share/4002)
|
|
||||||
**来源**:subject
|
|
||||||
**上传时间**:2025-01-06 09:00:02
|
|
||||||
**描述**:进程这个观念我们现在都已经很熟悉了,进程是一个程序的运行实例,进程我们可以看做是操作系统为应用程序提供的资源容器,比如内存空间,文件句柄,设备以及网络连接等等。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[CVE-2024-50379|条件竞争Tomcat RCE POC(首发)](https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486408&idx=1&sn=ac34350ed2c25084cb78cec5ff40275e)
|
|
||||||
**作者**:TtTeam
|
|
||||||
**上传时间**:2025-01-06 14:41:19
|
|
||||||
**简介**:半通杀|Tomcat RCE!无敌!
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【渗透利器】比proxifier更好用的代理神器,可轻松配置代理--sunnynet](https://mp.weixin.qq.com/s?__biz=Mzk0OTY3OTc5Mw==&mid=2247484914&idx=1&sn=ffcae701630227b7da949c2c63b66b04)
|
|
||||||
**作者**:网安鲲为帝
|
|
||||||
**上传时间**:2025-01-06 14:27:36
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[实战攻防中的信息收集](https://mp.weixin.qq.com/s?__biz=MzkyMjU2Nzc1Mg==&mid=2247484483&idx=1&sn=8f7983ac3a289460203b71969a365dbe)
|
|
||||||
**作者**:LHACK安全
|
|
||||||
**上传时间**:2025-01-06 14:00:57
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[CVE-2024-43452:针对 Windows 特权提升漏洞的 PoC 漏洞发布](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526837&idx=1&sn=bdc1792b20bbc0e3485123421c3c240c)
|
|
||||||
**作者**:Ots安全
|
|
||||||
**上传时间**:2025-01-06 13:53:08
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[CVE-2024-47575:FortiManager FortiManager Cloud 缺少身份验证允许执行任意代码或命令](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526827&idx=1&sn=02106475443306b2005d8031e320d35f)
|
|
||||||
**作者**:Ots安全
|
|
||||||
**上传时间**:2025-01-06 13:44:09
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[ThievingFox——从密码管理器和 Windows 实用程序远程检索凭据](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526827&idx=2&sn=357dc695b40732b89fd8115f61111e9a)
|
|
||||||
**作者**:Ots安全
|
|
||||||
**上传时间**:2025-01-06 13:44:09
|
|
||||||
**简介**:ThievingFox 是一组后漏洞利用工具,用于在渗透测试和类似活动中从工作站和服务器收集凭据。它的工作原理是让目标应用程序加载恶意库,该库执行内存挂钩以收集凭据。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【成功复现】爱数AnyShare SMTP_GetConfig 信息泄露漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502853&idx=1&sn=6116493ef276d07ee2f6c5105fb25d62)
|
|
||||||
**作者**:弥天安全实验室
|
|
||||||
**上传时间**:2025-01-06 12:18:51
|
|
||||||
**简介**:【成功复现】爱数AnyShare SMTP_GetConfig 信息泄露漏洞
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[工具集:PotatoTool【1.3更新】集合解密、分析、扫描、溯源、免杀、提权等功能的网络安全综合工具](https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247485088&idx=1&sn=dde3f7615d6d2e96776b49bce1762bea)
|
|
||||||
**作者**:风铃Sec
|
|
||||||
**上传时间**:2025-01-06 12:17:41
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[JAVA XXE 学习总结](https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247546440&idx=1&sn=1aafdd4bc381662ded1bedaacb7191f8)
|
|
||||||
**作者**:掌控安全EDU
|
|
||||||
**上传时间**:2025-01-06 12:02:15
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[从js到高危垂直越权漏洞挖掘](https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614973&idx=1&sn=0cb7f44aa7d6b3d7f0b82a6e1490a6cc)
|
|
||||||
**作者**:白帽子左一
|
|
||||||
**上传时间**:2025-01-06 12:01:05
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Java安全小记-FastJson反序列化](https://mp.weixin.qq.com/s?__biz=Mzk0ODY1NzEwMA==&mid=2247485169&idx=1&sn=804880c5f2fad83f50d7217bbe3dfe60)
|
|
||||||
**作者**:土拨鼠的安全屋
|
|
||||||
**上传时间**:2025-01-06 12:00:23
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[浅析CTF中PWN题堆类型的ORW技术](https://mp.weixin.qq.com/s?__biz=MjM5MjEyMTcyMQ==&mid=2651037243&idx=1&sn=6fcfd1790adc07489a7aa79613c56bfd)
|
|
||||||
**作者**:SAINTSEC
|
|
||||||
**上传时间**:2025-01-06 11:52:08
|
|
||||||
**简介**:浅析ctf中pwn题堆类型的orw
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[某华命令执行Rce原理分析](https://mp.weixin.qq.com/s?__biz=MzkyMjM5NDM3NQ==&mid=2247486194&idx=1&sn=1edc0eb964a23d4ef1d95e0668354d48)
|
|
||||||
**作者**:进击安全
|
|
||||||
**上传时间**:2025-01-06 11:45:51
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[[溯源]HuntBack(反击狩猎),用于攻防演练中,防守方对恶意ip进行web指纹扫描与识别](https://mp.weixin.qq.com/s?__biz=Mzg4NTgxNTc5Mg==&mid=2247486805&idx=1&sn=53ec3f82f35a73b14adc666c9ed0ca22)
|
|
||||||
**作者**:W啥都学
|
|
||||||
**上传时间**:2025-01-06 11:41:44
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞通告 | Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞](https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507635&idx=1&sn=3ed64fc475689a3cd2c08cc3a146a471)
|
|
||||||
**作者**:微步在线研究响应中心
|
|
||||||
**上传时间**:2025-01-06 10:50:43
|
|
||||||
**简介**:立即查看漏洞详情
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【介质取证】“隐藏”在日志文件里的行为痕迹](https://mp.weixin.qq.com/s?__biz=MzI0OTEyMTk5OQ==&mid=2247494068&idx=1&sn=7903df1ae2f96b57d88bdccc88dbdb38)
|
|
||||||
**作者**:平航科技
|
|
||||||
**上传时间**:2025-01-06 10:01:02
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[刷脸登录银行 App 现他人信息,银行回应称“网络抖动带来的极小概率事件”|Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650606244&idx=1&sn=8000e773da8fb2b362bc7283a912db76)
|
|
||||||
**作者**:黑白之道
|
|
||||||
**上传时间**:2025-01-06 09:55:05
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[针对 PostgreSQL 数据库的攻击研究](https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247499743&idx=1&sn=f6f99cdd5962403d8c00657ceaa708a5)
|
|
||||||
**作者**:信安之路
|
|
||||||
**上传时间**:2025-01-06 09:37:29
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【漏洞复现】快云服务器助手GetDetail接口文件任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzI1NTE2NzQ3NQ==&mid=2247485521&idx=2&sn=21fccb1beac3a0dcc9a565a36fcfa9a7)
|
|
||||||
**作者**:网络安全007
|
|
||||||
**上传时间**:2025-01-06 09:01:03
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【Nday漏洞分析】ProjectSend 身份认证绕过漏洞(CVE-2024-11680)](https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247486903&idx=1&sn=0a066aff4189674338d0ffe68e405275)
|
|
||||||
**作者**:神农Sec
|
|
||||||
**上传时间**:2025-01-06 09:00:39
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[vulnhub之unknowndevice2的实践](https://mp.weixin.qq.com/s?__biz=MzA3MjM5MDc2Nw==&mid=2650748903&idx=1&sn=f3265733267791c930270b071e833d0e)
|
|
||||||
**作者**:云计算和网络安全技术实践
|
|
||||||
**上传时间**:2025-01-06 08:46:59
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[内网渗透之ADCS权限维持](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494683&idx=1&sn=ff1e934c2bb0dee6e9959d04e96218c0)
|
|
||||||
**作者**:七芒星实验室
|
|
||||||
**上传时间**:2025-01-06 08:46:33
|
|
||||||
**简介**:文章前言本篇文章主要介绍如何通过证书服务来实现权限维持的目的基本原理在微软的文档里有一段话\\x26quot;当使用PKCA时
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[企业安全建设之蜜罐搭建与使用](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494683&idx=2&sn=2fb0376ca472b4a0a1eff27d319df088)
|
|
||||||
**作者**:七芒星实验室
|
|
||||||
**上传时间**:2025-01-06 08:46:33
|
|
||||||
**简介**:基本介绍HFish是一款基于Golang开发的跨平台多功能主动诱导型开源国产蜜罐框架系统,它从内网失陷检测、
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[W&Jsoft-D-Security数据仿泄露系统(DLP)存在任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=Mzg2NzkxOTQ0OA==&mid=2247484492&idx=1&sn=7da5690238bdb790765079470195bd8e)
|
|
||||||
**作者**:菜鸟学渗透
|
|
||||||
**上传时间**:2025-01-06 08:30:31
|
|
||||||
**简介**:W\\x26amp;Jsoft-D-Security数据仿泄露系统(DLP)存在任意文件读取漏洞
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【实用工具】Windows应急响应上机排查工具](https://mp.weixin.qq.com/s?__biz=MzIxOTk0ODY0NQ==&mid=2247485387&idx=1&sn=59722752cf6054be5cf5ff0645012d04)
|
|
||||||
**作者**:如棠安全
|
|
||||||
**上传时间**:2025-01-06 08:15:40
|
|
||||||
**简介**:在上机排查过程中,通过“事件查看器”逐个查看系统日志太过繁琐。这样的话,我们可以通过此工具一键对系统日志进行分类核查,有效提高上机研判、处置能力。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[免杀系列 - 无法让管理员找到你的木马进程](https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487937&idx=1&sn=f424ff0e311911b564ad87924e90b994)
|
|
||||||
**作者**:SecretTeam安全团队
|
|
||||||
**上传时间**:2025-01-06 08:08:29
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【神兵利器】GRS内网穿透工具](https://mp.weixin.qq.com/s?__biz=MzU2NzY5MzI5Ng==&mid=2247504721&idx=1&sn=e25858d7e5772aa1d94b191a42a49d49)
|
|
||||||
**作者**:菜鸟学信安
|
|
||||||
**上传时间**:2025-01-06 08:03:20
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[记一次某道CMS审计过程](https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247510233&idx=1&sn=0159324632f603442a3a7b5d5bec845c)
|
|
||||||
**作者**:李白你好
|
|
||||||
**上传时间**:2025-01-06 08:01:49
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Hacking Scanner 一键渗透扫描器](https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247493163&idx=1&sn=cd8f69d7ecc43e8bc09da662d0094ede)
|
|
||||||
**作者**:夜组安全
|
|
||||||
**上传时间**:2025-01-06 08:01:01
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[X-Ways Forensics 包含报告表/标签的使用](https://mp.weixin.qq.com/s?__biz=Mzg3NTU3NTY0Nw==&mid=2247489479&idx=1&sn=a196e28523a7438789bb56901d775f8d)
|
|
||||||
**作者**:网络安全与取证研究
|
|
||||||
**上传时间**:2025-01-06 08:00:57
|
|
||||||
**简介**:关于包含报告表/标签功能,笔者也是在一次偶然之中领悟到了其强大之处,因为之前一直都认为报告表功能并无大用。现在,标签列是我分析页面中 的常驻列,并且往往处在较为靠前的位置。笔者希望能通过本文介绍包含报告表/标签的强大之处和高效用法。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | WordPress Plugin Tutor SQL注入漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=1&sn=fbd0590c31f7e295b5743345888e231c)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-06 08:00:30
|
|
||||||
**简介**:WordPress插件Tutor LMS的/wp-admin/admin-ajax.php接口存在SQL注入漏洞,未经身份验证的攻击者可以通过该漏洞获取数据库敏感信息。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | 友数聚CPAS审计管理系统SQL注入和任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=2&sn=1e67ec9b7cddeda507a7d80598525961)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-06 08:00:30
|
|
||||||
**简介**:友数聚CPAS审计管理系统存在SQL注入和任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞获取敏感信息,建议相关用户及时更新。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[工具 | Hfish](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=4&sn=22a306b858e629b4d99395f890731306)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-06 08:00:30
|
|
||||||
**简介**:HFish是一款社区型免费蜜罐。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Ember Bear APT 攻击模拟](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504432&idx=1&sn=89ec75cbd0580342d7cde65855139ace)
|
|
||||||
**作者**:安全狗的自我修养
|
|
||||||
**上传时间**:2025-01-06 07:09:53
|
|
||||||
**简介**:这是对 (Ember Bear) APT 组织针对乌克兰能源组织的攻击的模拟,攻击活动于 2021 年 4 月活跃,攻击链开
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[浅谈密码相关原理及代码实现](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518163&idx=1&sn=e2b7200747c06902d53e3556d78d9c31)
|
|
||||||
**作者**:船山信安
|
|
||||||
**上传时间**:2025-01-06 00:12:23
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[安卓逆向2025 -- Frida学习之环境搭建](https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037473&idx=1&sn=fc63b8d78a7113b33bc9630af30dce5b)
|
|
||||||
**作者**:逆向有你
|
|
||||||
**上传时间**:2025-01-06 00:00:29
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows 11 BitLocker被绕过,来提取卷加密密钥](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498072&idx=2&sn=d5947fa42d47876f2c6a88dfd33a2479)
|
|
||||||
**作者**:河南等级保护测评
|
|
||||||
**上传时间**:2025-01-06 00:00:20
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[黑客利用 DoS 漏洞禁用 Palo Alto Networks 防火墙](https://mp.weixin.qq.com/s?__biz=Mzg3ODY0NTczMA==&mid=2247491876&idx=1&sn=1ffb723d73f1a24290998ff19c4f929e)
|
|
||||||
**作者**:犀牛安全
|
|
||||||
**上传时间**:2025-01-06 00:00:00
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[记两次内网入侵溯源](https://mp.weixin.qq.com/s?__biz=Mzg2NDYwMDA1NA==&mid=2247543401&idx=1&sn=529638018a2a223edc0be924bf6d9d30)
|
|
||||||
**作者**:Hacking黑白红
|
|
||||||
**上传时间**:2025-01-05 23:26:58
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[研究人员发布针对 Windows LDAP 漏洞的 PoC 漏洞利用程序](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505530&idx=4&sn=d74d0d52adbd4477bc0279d88f92f1e3)
|
|
||||||
**作者**:网络研究观
|
|
||||||
**上传时间**:2025-01-05 21:27:48
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【漏洞复现】内训宝 SCORM 模块存在任意文件上传漏洞](https://mp.weixin.qq.com/s?__biz=MzI1NTE2NzQ3NQ==&mid=2247485511&idx=1&sn=24c216754ea9f84396bd3159a2ec4b0f)
|
|
||||||
**作者**:网络安全007
|
|
||||||
**上传时间**:2025-01-05 16:26:41
|
|
||||||
**简介**:内训宝 SCORM 模块存在任意文件上传漏洞|附复现过程!
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【渗透 Tips】解决Edge的IE模式下无法抓包情况](https://mp.weixin.qq.com/s?__biz=MzIzNDU5Mzk2OQ==&mid=2247486346&idx=1&sn=abef247f01a77843ed143f35d85ae810)
|
|
||||||
**作者**:阿呆攻防
|
|
||||||
**上传时间**:2025-01-05 16:07:40
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[JS逆向系列17-Hook_cookie v0.2脚本原理解析](https://mp.weixin.qq.com/s?__biz=MzkzNTcwOTgxMQ==&mid=2247485234&idx=1&sn=3948bce9c853c43f96632533b5ef236a)
|
|
||||||
**作者**:Spade sec
|
|
||||||
**上传时间**:2025-01-05 15:47:51
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[2024 数证杯流量分析WP](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518156&idx=1&sn=6b52ea6ce0a870f4a425c6cdbc325f5e)
|
|
||||||
**作者**:船山信安
|
|
||||||
**上传时间**:2025-01-05 10:45:23
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[针对潜在危险的 Windows LDAP 漏洞的利用代码已发布](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498048&idx=2&sn=76a1a1db4b128f834fc607a9518b2f8d)
|
|
||||||
**作者**:河南等级保护测评
|
|
||||||
**上传时间**:2025-01-05 00:12:58
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[安卓逆向 -- 某TV抓包和jce响应解析](https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037449&idx=1&sn=37bae8ad1d88fb2fe194256e6326e768)
|
|
||||||
**作者**:逆向有你
|
|
||||||
**上传时间**:2025-01-05 00:01:26
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[网络抓包神器:Tcpdump实用技巧与案例解析](https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247569384&idx=1&sn=3dda4be3d2a2361e8de95a139536e7b4)
|
|
||||||
**作者**:马哥网络安全
|
|
||||||
**上传时间**:2025-01-04 17:01:47
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5)
|
|
||||||
**作者**:教父爱分享
|
|
||||||
**上传时间**:2025-01-05 23:19:42
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0)
|
|
||||||
**作者**:暴暴的皮卡丘
|
|
||||||
**上传时间**:2025-01-05 22:44:13
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839)
|
|
||||||
**作者**:安全初心
|
|
||||||
**上传时间**:2025-01-05 22:32:13
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6)
|
|
||||||
**作者**:商密君
|
|
||||||
**上传时间**:2025-01-05 19:15:38
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608)
|
|
||||||
**作者**:玲珑安全
|
|
||||||
**上传时间**:2025-01-05 18:55:21
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768)
|
|
||||||
**作者**:芳华绝代安全团队
|
|
||||||
**上传时间**:2025-01-05 18:53:58
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770)
|
|
||||||
**作者**:securitainment
|
|
||||||
**上传时间**:2025-01-04 23:04:05
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5)
|
|
||||||
**作者**:冲鸭安全
|
|
||||||
**上传时间**:2025-01-04 10:00:36
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Metasploit Framework是一款开源安全漏洞检测工具。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9)
|
|
||||||
**作者**:技术修道场
|
|
||||||
**上传时间**:2025-01-04 08:00:17
|
|
||||||
**简介**:安全紧急关注!据 VulnCheck 最新披露,知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞(CVE-2024-12856),目前正遭受黑客大规模攻击!更危险的是,利用该漏洞竟只需默认密码!
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【oscp】Tr0ll 靶机全系列(1-3),FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74)
|
|
||||||
**作者**:泷羽Sec
|
|
||||||
**上传时间**:2025-01-04 07:44:56
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8)
|
|
||||||
**作者**:安全狗的自我修养
|
|
||||||
**上传时间**:2025-01-04 07:09:11
|
|
||||||
**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[无文件恶意软件 – 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822)
|
|
||||||
**作者**:河南等级保护测评
|
|
||||||
**上传时间**:2025-01-04 07:05:19
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621)
|
|
||||||
**作者**:七芒星实验室
|
|
||||||
**上传时间**:2025-01-04 07:00:24
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182)
|
|
||||||
**作者**:船山信安
|
|
||||||
**上传时间**:2025-01-04 02:01:04
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
|
|
||||||
**作者**:OneMoreThink
|
|
||||||
**上传时间**:2025-01-04 01:17:57
|
|
||||||
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5)
|
|
||||||
**作者**:教父爱分享
|
|
||||||
**上传时间**:2025-01-05 23:19:42
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0)
|
|
||||||
**作者**:暴暴的皮卡丘
|
|
||||||
**上传时间**:2025-01-05 22:44:13
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839)
|
|
||||||
**作者**:安全初心
|
|
||||||
**上传时间**:2025-01-05 22:32:13
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6)
|
|
||||||
**作者**:商密君
|
|
||||||
**上传时间**:2025-01-05 19:15:38
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608)
|
|
||||||
**作者**:玲珑安全
|
|
||||||
**上传时间**:2025-01-05 18:55:21
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768)
|
|
||||||
**作者**:芳华绝代安全团队
|
|
||||||
**上传时间**:2025-01-05 18:53:58
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770)
|
|
||||||
**作者**:securitainment
|
|
||||||
**上传时间**:2025-01-04 23:04:05
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5)
|
|
||||||
**作者**:冲鸭安全
|
|
||||||
**上传时间**:2025-01-04 10:00:36
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Metasploit Framework是一款开源安全漏洞检测工具。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9)
|
|
||||||
**作者**:技术修道场
|
|
||||||
**上传时间**:2025-01-04 08:00:17
|
|
||||||
**简介**:安全紧急关注!据 VulnCheck 最新披露,知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞(CVE-2024-12856),目前正遭受黑客大规模攻击!更危险的是,利用该漏洞竟只需默认密码!
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【oscp】Tr0ll 靶机全系列(1-3),FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74)
|
|
||||||
**作者**:泷羽Sec
|
|
||||||
**上传时间**:2025-01-04 07:44:56
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8)
|
|
||||||
**作者**:安全狗的自我修养
|
|
||||||
**上传时间**:2025-01-04 07:09:11
|
|
||||||
**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[无文件恶意软件 – 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822)
|
|
||||||
**作者**:河南等级保护测评
|
|
||||||
**上传时间**:2025-01-04 07:05:19
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621)
|
|
||||||
**作者**:七芒星实验室
|
|
||||||
**上传时间**:2025-01-04 07:00:24
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182)
|
|
||||||
**作者**:船山信安
|
|
||||||
**上传时间**:2025-01-04 02:01:04
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
|
|
||||||
**作者**:OneMoreThink
|
|
||||||
**上传时间**:2025-01-04 01:17:57
|
|
||||||
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[双击劫持:攻击者可以悄无声息地窃取用户账户](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=3&sn=6b53d706b8c196758b7385fb31f0e0a8)
|
|
||||||
**作者**:网络研究观
|
|
||||||
**上传时间**:2025-01-04 00:30:41
|
|
||||||
**简介**:两次鼠标点击之间的时间足以让黑客交换网页并诱骗受害者意外授权访问或转账。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[新的“DoubleClickjacking”攻击针对 OAuth 进行帐户接管](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=5&sn=9bd1c23d7430a1486c6ad45a04a34d50)
|
|
||||||
**作者**:网络研究观
|
|
||||||
**上传时间**:2025-01-04 00:30:41
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5)
|
|
||||||
**作者**:教父爱分享
|
|
||||||
**上传时间**:2025-01-05 23:19:42
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0)
|
|
||||||
**作者**:暴暴的皮卡丘
|
|
||||||
**上传时间**:2025-01-05 22:44:13
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839)
|
|
||||||
**作者**:安全初心
|
|
||||||
**上传时间**:2025-01-05 22:32:13
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6)
|
|
||||||
**作者**:商密君
|
|
||||||
**上传时间**:2025-01-05 19:15:38
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608)
|
|
||||||
**作者**:玲珑安全
|
|
||||||
**上传时间**:2025-01-05 18:55:21
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768)
|
|
||||||
**作者**:芳华绝代安全团队
|
|
||||||
**上传时间**:2025-01-05 18:53:58
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770)
|
|
||||||
**作者**:securitainment
|
|
||||||
**上传时间**:2025-01-04 23:04:05
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5)
|
|
||||||
**作者**:冲鸭安全
|
|
||||||
**上传时间**:2025-01-04 10:00:36
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Metasploit Framework是一款开源安全漏洞检测工具。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9)
|
|
||||||
**作者**:技术修道场
|
|
||||||
**上传时间**:2025-01-04 08:00:17
|
|
||||||
**简介**:安全紧急关注!据 VulnCheck 最新披露,知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞(CVE-2024-12856),目前正遭受黑客大规模攻击!更危险的是,利用该漏洞竟只需默认密码!
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【oscp】Tr0ll 靶机全系列(1-3),FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74)
|
|
||||||
**作者**:泷羽Sec
|
|
||||||
**上传时间**:2025-01-04 07:44:56
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8)
|
|
||||||
**作者**:安全狗的自我修养
|
|
||||||
**上传时间**:2025-01-04 07:09:11
|
|
||||||
**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[无文件恶意软件 – 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822)
|
|
||||||
**作者**:河南等级保护测评
|
|
||||||
**上传时间**:2025-01-04 07:05:19
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621)
|
|
||||||
**作者**:七芒星实验室
|
|
||||||
**上传时间**:2025-01-04 07:00:24
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182)
|
|
||||||
**作者**:船山信安
|
|
||||||
**上传时间**:2025-01-04 02:01:04
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
|
|
||||||
**作者**:OneMoreThink
|
|
||||||
**上传时间**:2025-01-04 01:17:57
|
|
||||||
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[双击劫持:攻击者可以悄无声息地窃取用户账户](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=3&sn=6b53d706b8c196758b7385fb31f0e0a8)
|
|
||||||
**作者**:网络研究观
|
|
||||||
**上传时间**:2025-01-04 00:30:41
|
|
||||||
**简介**:两次鼠标点击之间的时间足以让黑客交换网页并诱骗受害者意外授权访问或转账。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[新的“DoubleClickjacking”攻击针对 OAuth 进行帐户接管](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=5&sn=9bd1c23d7430a1486c6ad45a04a34d50)
|
|
||||||
**作者**:网络研究观
|
|
||||||
**上传时间**:2025-01-04 00:30:41
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5)
|
|
||||||
**作者**:教父爱分享
|
|
||||||
**上传时间**:2025-01-05 23:19:42
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0)
|
|
||||||
**作者**:暴暴的皮卡丘
|
|
||||||
**上传时间**:2025-01-05 22:44:13
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839)
|
|
||||||
**作者**:安全初心
|
|
||||||
**上传时间**:2025-01-05 22:32:13
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608)
|
|
||||||
**作者**:玲珑安全
|
|
||||||
**上传时间**:2025-01-05 18:55:21
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768)
|
|
||||||
**作者**:芳华绝代安全团队
|
|
||||||
**上传时间**:2025-01-05 18:53:58
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770)
|
|
||||||
**作者**:securitainment
|
|
||||||
**上传时间**:2025-01-04 23:04:05
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5)
|
|
||||||
**作者**:冲鸭安全
|
|
||||||
**上传时间**:2025-01-04 10:00:36
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Metasploit Framework是一款开源安全漏洞检测工具。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9)
|
|
||||||
**作者**:技术修道场
|
|
||||||
**上传时间**:2025-01-04 08:00:17
|
|
||||||
**简介**:安全紧急关注!据 VulnCheck 最新披露,知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞(CVE-2024-12856),目前正遭受黑客大规模攻击!更危险的是,利用该漏洞竟只需默认密码!
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【oscp】Tr0ll 靶机全系列(1-3),FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74)
|
|
||||||
**作者**:泷羽Sec
|
|
||||||
**上传时间**:2025-01-04 07:44:56
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8)
|
|
||||||
**作者**:安全狗的自我修养
|
|
||||||
**上传时间**:2025-01-04 07:09:11
|
|
||||||
**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[无文件恶意软件 – 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822)
|
|
||||||
**作者**:河南等级保护测评
|
|
||||||
**上传时间**:2025-01-04 07:05:19
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621)
|
|
||||||
**作者**:七芒星实验室
|
|
||||||
**上传时间**:2025-01-04 07:00:24
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182)
|
|
||||||
**作者**:船山信安
|
|
||||||
**上传时间**:2025-01-04 02:01:04
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[双击劫持:攻击者可以悄无声息地窃取用户账户](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=3&sn=6b53d706b8c196758b7385fb31f0e0a8)
|
|
||||||
**作者**:网络研究观
|
|
||||||
**上传时间**:2025-01-04 00:30:41
|
|
||||||
**简介**:两次鼠标点击之间的时间足以让黑客交换网页并诱骗受害者意外授权访问或转账。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[新的“DoubleClickjacking”攻击针对 OAuth 进行帐户接管](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=5&sn=9bd1c23d7430a1486c6ad45a04a34d50)
|
|
||||||
**作者**:网络研究观
|
|
||||||
**上传时间**:2025-01-04 00:30:41
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6)
|
|
||||||
**作者**:商密君
|
|
||||||
**上传时间**:2025-01-05 19:15:38
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
|
|
||||||
**作者**:OneMoreThink
|
|
||||||
**上传时间**:2025-01-04 01:17:57
|
|
||||||
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
|
|
||||||
**作者**:OneMoreThink
|
|
||||||
**上传时间**:2025-01-04 01:17:57
|
|
||||||
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【高危漏洞预警】Windows LDAP远程代码执行漏洞(CVE-2024-49112)](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489400&idx=1&sn=c983947941f4637d6fade0c80b18ea2c)
|
|
||||||
**作者**:飓风网络安全
|
|
||||||
**上传时间**:2025-01-03 22:37:58
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【已复现】Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞(CVE-2024-49113)安全风险通告](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502708&idx=1&sn=30ee0bf007924eb359c6c609b3ba1cb7)
|
|
||||||
**作者**:奇安信 CERT
|
|
||||||
**上传时间**:2025-01-03 22:18:20
|
|
||||||
**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【成功复现】大华智能物联综合管理平台远程代码执行漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502820&idx=1&sn=5ebcb4158f712c89ddc3f0c5b1ee0bed)
|
|
||||||
**作者**:弥天安全实验室
|
|
||||||
**上传时间**:2025-01-03 18:50:36
|
|
||||||
**简介**:【成功复现】大华智能物联综合管理平台远程代码执行漏洞
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[大量 Four-Faith 路由器因严重漏洞面临远程攻击风险](https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515719&idx=1&sn=01c1fdb783a2a11f73b6961114c9435b)
|
|
||||||
**作者**:河北镌远网络科技有限公司
|
|
||||||
**上传时间**:2025-01-03 18:29:17
|
|
||||||
**简介**:大量 Four-Faith 路由器因严重漏洞面临远程攻击风险
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
|
|
||||||
**作者**:OneMoreThink
|
|
||||||
**上传时间**:2025-01-04 01:17:57
|
|
||||||
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【高危漏洞预警】Windows LDAP远程代码执行漏洞(CVE-2024-49112)](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489400&idx=1&sn=c983947941f4637d6fade0c80b18ea2c)
|
|
||||||
**作者**:飓风网络安全
|
|
||||||
**上传时间**:2025-01-03 22:37:58
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【已复现】Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞(CVE-2024-49113)安全风险通告](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502708&idx=1&sn=30ee0bf007924eb359c6c609b3ba1cb7)
|
|
||||||
**作者**:奇安信 CERT
|
|
||||||
**上传时间**:2025-01-03 22:18:20
|
|
||||||
**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【成功复现】大华智能物联综合管理平台远程代码执行漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502820&idx=1&sn=5ebcb4158f712c89ddc3f0c5b1ee0bed)
|
|
||||||
**作者**:弥天安全实验室
|
|
||||||
**上传时间**:2025-01-03 18:50:36
|
|
||||||
**简介**:【成功复现】大华智能物联综合管理平台远程代码执行漏洞
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[大量 Four-Faith 路由器因严重漏洞面临远程攻击风险](https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515719&idx=1&sn=01c1fdb783a2a11f73b6961114c9435b)
|
|
||||||
**作者**:河北镌远网络科技有限公司
|
|
||||||
**上传时间**:2025-01-03 18:29:17
|
|
||||||
**简介**:大量 Four-Faith 路由器因严重漏洞面临远程攻击风险
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
|
|
||||||
**作者**:浅安安全
|
|
||||||
**上传时间**:2025-01-04 08:03:54
|
|
||||||
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
|
|
||||||
**作者**:OneMoreThink
|
|
||||||
**上传时间**:2025-01-04 01:17:57
|
|
||||||
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【高危漏洞预警】Windows LDAP远程代码执行漏洞(CVE-2024-49112)](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489400&idx=1&sn=c983947941f4637d6fade0c80b18ea2c)
|
|
||||||
**作者**:飓风网络安全
|
|
||||||
**上传时间**:2025-01-03 22:37:58
|
|
||||||
**简介**:None
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【已复现】Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞(CVE-2024-49113)安全风险通告](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502708&idx=1&sn=30ee0bf007924eb359c6c609b3ba1cb7)
|
|
||||||
**作者**:奇安信 CERT
|
|
||||||
**上传时间**:2025-01-03 22:18:20
|
|
||||||
**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[【成功复现】大华智能物联综合管理平台远程代码执行漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502820&idx=1&sn=5ebcb4158f712c89ddc3f0c5b1ee0bed)
|
|
||||||
**作者**:弥天安全实验室
|
|
||||||
**上传时间**:2025-01-03 18:50:36
|
|
||||||
**简介**:【成功复现】大华智能物联综合管理平台远程代码执行漏洞
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[大量 Four-Faith 路由器因严重漏洞面临远程攻击风险](https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515719&idx=1&sn=01c1fdb783a2a11f73b6961114c9435b)
|
|
||||||
**作者**:河北镌远网络科技有限公司
|
|
||||||
**上传时间**:2025-01-03 18:29:17
|
|
||||||
**简介**:大量 Four-Faith 路由器因严重漏洞面临远程攻击风险
|
|
||||||
|
|
||||||
----------------------------------------
|
|
@ -1,28 +0,0 @@
|
|||||||
#### 文章:[路飞爬虫开发App逆向第八期share](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9l40l5MWzjtbsbsR6eNCWCFc2fBtcWxYi1RScM2JNWvWAbXS2wSQe0vsRQxnJ7FxpS7-Hly9zOKbAYIy9riVzrmGRJgS4PuGQmbXjaxbg2fDzhk0fzVTRilh1Dg5i4BYm9iLOcV7xnhleHYIRY1mnBfK97YnmvOAU-mai6i3jnIE6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA)
|
|
||||||
描述:关注以上公众号,后台回复 课程 即可领取哦~有路飞爬虫开发App逆向第八期share路飞爬虫开发App逆向第八期share### 路飞爬虫开...
|
|
||||||
**上传时间**:2025-01-01 05:11:41
|
|
||||||
**作者**:小马找课呀
|
|
||||||
**关键词**:APP逆向
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[抖音APP逆向:附带抓包与6神算法探索](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKNciYPpIcdmE5dl9P8Paw_x58MkIGEcJw3juWkEMf3Hfa2tGfX7oJGkopviLeKN6p0Qsf5Pjq5lQJ440gcqIG3P92dCjJKmIEw71YhhkAfJptZjnqDZ-9WctPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA)
|
|
||||||
描述:走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必...
|
|
||||||
**上传时间**:2025-01-03 13:10:22
|
|
||||||
**作者**:彪哥in讲py
|
|
||||||
**关键词**:APP逆向
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[APP逆向工具清单](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKEQotIC1WeYHE8IYVGBIMwjYX9eBY-oL5HUkRlYI-PnA1yRFHhpHP7Sm7W-AWObVBA3hV_7JOu-4Bl_kDMDYSBKlyTq-ojDhmiIxLICWVTQxzYYD-Z4gXxIGX_iHL9MadA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA)
|
|
||||||
描述:嘿,各位热爱编程的小伙伴们,今天咱们来聊聊APP逆向的那些事儿.给大家整理一份实用的APP逆向工具清单.一、环境准备篇重点...
|
|
||||||
**上传时间**:2025-01-03 13:10:22
|
|
||||||
**作者**:彪哥in讲py
|
|
||||||
**关键词**:APP逆向
|
|
||||||
|
|
||||||
----------------------------------------
|
|
||||||
#### 文章:[APP逆向sign签名算法:Python实战指南](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9Z2uQi14zjGFECgple0Il5-1K8SLax84YfVaqkNMacaLrG1rkvGbndY6sEGVytRQ2Xa9okGtxlAiFdqvEtLdW8rbW9xGCpXc-0hrzlDs5UvWb91zgNMTb1rkzPqK4FbfdwKi3bykgC3WcITmV9kKf9MJmAnpcRK7rN62zqqL31VVS6t2rFt2rnA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA)
|
|
||||||
描述:在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...
|
|
||||||
**上传时间**:2025-01-03 09:40:29
|
|
||||||
**作者**:雷雷讲py
|
|
||||||
**关键词**:APP逆向
|
|
||||||
|
|
||||||
----------------------------------------
|
|
@ -1,22 +0,0 @@
|
|||||||
2025-01-06 16:48:36 - INFO - __main__:<module>:252 - 程序正在运行当中。
|
|
||||||
2025-01-06 16:48:46 - INFO - __main__:send_first_message:232 - 飞书发送 程序信息 成功
|
|
||||||
2025-01-06 16:48:46 - INFO - __main__:send_first_message:235 - 飞书发送 RSS源状态 成功
|
|
||||||
2025-01-06 16:48:47 - INFO - __main__:send_first_message:237 - 飞书发送 首次运行提醒 成功
|
|
||||||
2025-01-06 16:48:47 - INFO - __main__:main_job:185 - 发送程序启动,当前时间为:2025-01-06 16:48:47
|
|
||||||
2025-01-06 16:48:47 - INFO - __main__:main_job:186 - 正在启动各爬虫并获取资源中...
|
|
||||||
2025-01-06 16:48:48 - INFO - spider.common:seebug_main:76 - 数据已保存到 ./resources/JSON/seebug.json!
|
|
||||||
2025-01-06 16:48:48 - INFO - spider.common:anquanke_main:112 - 数据已保存到 ./resources/JSON/anquanke.json!
|
|
||||||
2025-01-06 16:48:49 - INFO - spider.common:huawei_main:148 - 数据已保存到 ./resources/JSON/huawei.json!
|
|
||||||
2025-01-06 16:48:49 - INFO - spider.common:doonsec_main:166 - 数据已保存到 ./resources/JSON/doonsec.json!
|
|
||||||
2025-01-06 16:48:49 - INFO - spider.common:qianxin_main:184 - 数据已保存到 ./resources/JSON/qianxin.json!
|
|
||||||
2025-01-06 16:48:49 - INFO - spider.freebuf:freebuf_main:69 - 数据已保存到 ./resources/JSON/freebuf.json!
|
|
||||||
2025-01-06 16:48:51 - INFO - spider.xianzhi:xianzhi_main:67 - 数据已保存到 ./resources/JSON/xianzhi.json!
|
|
||||||
2025-01-06 16:48:51 - INFO - spider.common:M_4hou_main:94 - 数据已保存到 ./resources/JSON/4hou.json!
|
|
||||||
2025-01-06 16:48:51 - INFO - __main__:check_avaliable:86 - 嘶吼资讯数据为空,跳过执行。
|
|
||||||
2025-01-06 16:48:52 - INFO - __main__:check_avaliable:63 - 飞书发送 安全客资讯 成功
|
|
||||||
2025-01-06 16:49:08 - INFO - __main__:check_avaliable:63 - 飞书发送 洞见微信安全资讯 成功
|
|
||||||
2025-01-06 16:49:23 - INFO - __main__:check_avaliable:86 - 先知社区资讯数据为空,跳过执行。
|
|
||||||
2025-01-06 16:49:23 - INFO - __main__:check_avaliable:63 - 飞书发送 FreeBuf资讯 成功
|
|
||||||
2025-01-06 16:49:39 - INFO - __main__:check_avaliable:63 - 飞书发送 奇安信攻防社区资讯 成功
|
|
||||||
2025-01-06 16:49:54 - INFO - __main__:check_avaliable:86 - Seebug社区资讯数据为空,跳过执行。
|
|
||||||
2025-01-06 16:51:59 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
|
|
@ -59,7 +59,8 @@ def github_main_keyword(key, black_words):
|
|||||||
if result == None:
|
if result == None:
|
||||||
time.sleep(5)
|
time.sleep(5)
|
||||||
continue
|
continue
|
||||||
for i in range(0, 20):
|
n = len(result['items'])
|
||||||
|
for i in range(0, n):
|
||||||
description = result['items'][i]['description']
|
description = result['items'][i]['description']
|
||||||
|
|
||||||
if description is None:
|
if description is None:
|
||||||
|
@ -99,7 +99,7 @@ def sougou_wx_main(keywords):
|
|||||||
results = parse_html(html_content)
|
results = parse_html(html_content)
|
||||||
# 移除非法代理对
|
# 移除非法代理对
|
||||||
cleaned_results = [{k: remove_surrogates(v) for k, v in item.items()} for item in results]
|
cleaned_results = [{k: remove_surrogates(v) for k, v in item.items()} for item in results]
|
||||||
logger.warning(f"关键词【{keyword}】的微信公众号-Sogou搜索内容保存成功。")
|
logger.info(f"关键词【{keyword}】的微信公众号-Sogou搜索内容保存成功。")
|
||||||
all_results[keyword] = cleaned_results # 将结果存储在字典中,以关键词为键
|
all_results[keyword] = cleaned_results # 将结果存储在字典中,以关键词为键
|
||||||
time.sleep(5)
|
time.sleep(5)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user